7 executing program 0: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000440)={0x2, 0x70, 0xb8, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000480)={0x14, 0x16, 0x701, 0x0, 0x0, {0x1}}, 0x14}}, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, 0x0, 0x0) 23:14:47 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x80) write$ppp(r2, &(0x7f0000000100)="0ca26a1ed3396118a77cb6e7a5cdceeb44fe3d20136d543abed530e631fa0fb5ef994933f65600bf0338ee5516096350cc9559f5a1a6b1aff6", 0x39) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:47 executing program 3: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x200000002b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 23:14:47 executing program 4: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x80001, 0x0) setsockopt$inet6_MCAST_JOIN_GROUP(r0, 0x29, 0x2a, &(0x7f0000000340)={0x0, {{0xa, 0x0, 0x0, @mcast1}}}, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x200000002b, &(0x7f0000000140)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, {{0xa, 0x0, 0x0, @dev}}}, 0x108) 23:14:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 23:14:47 executing program 0: pipe(&(0x7f0000000140)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000100)) close(0xffffffffffffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6(0xa, 0x2, 0x0) bind$inet6(r1, &(0x7f0000000000)={0xa, 0x14e24}, 0x1c) recvmmsg(r1, 0x0, 0x0, 0x0, 0x0) r2 = socket$inet(0x10, 0x0, 0x0) sendmsg(r2, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, &(0x7f0000000280)=@get={0x1, &(0x7f0000000180)=""/85, 0x3}) connect$inet6(r1, &(0x7f0000000080)={0xa, 0x1000000000004e24, 0x0, @loopback}, 0x1c) sendmmsg(r1, &(0x7f00000092c0), 0x4ff, 0x0) r3 = dup(r0) sendmsg$TIPC_NL_PUBL_GET(r3, 0x0, 0x0) getdents64(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$EVIOCGSND(0xffffffffffffffff, 0x8040451a, 0x0) clock_gettime(0x0, &(0x7f0000000240)={0x0, 0x0}) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, r4+30000000}, 0x0) r5 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/policy\x00', 0x0, 0x0) ioctl$BLKZEROOUT(r5, 0x127f, &(0x7f0000000340)={0xa9a, 0xffff}) 23:14:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:47 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) init_module(&(0x7f0000000000)='devlink\x00', 0x8, &(0x7f0000000100)='devlink\x00') ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:47 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x40) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 23:14:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:48 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000001c0)=@newlink={0x38, 0x10, 0x501, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x18, 0x12, @sit={{0x8, 0x1, 'sit\x00'}, {0xc, 0x2, [@tunl_policy=[@IFLA_IPTUN_ENCAP_TYPE={0x8, 0xf, 0x3}]]}}}]}, 0xfffffffffffffe52}}, 0x0) 23:14:48 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:14:48 executing program 4: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) ioctl$FS_IOC_GETFLAGS(r0, 0x80086601, &(0x7f0000000040)) 23:14:48 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) getsockopt$inet_mtu(r3, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000100)=0x4) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:48 executing program 0: syz_mount_image$vfat(&(0x7f0000000000)='vfat\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x300008, &(0x7f00000000c0)) 23:14:48 executing program 4: r0 = socket(0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r1, &(0x7f0000000000)={0xa, 0xfffe, 0x0, @rand_addr="00008000"}, 0xb) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_opts(0xffffffffffffffff, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb314d", 0x29) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') renameat2(r3, &(0x7f0000000000)='./file0\x00', r4, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xd}, 0x0, 0x2, 0xfffffffe, 0x3, 0x0, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)=0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r5, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f0000000700)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) r8 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r9 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') renameat2(r8, &(0x7f0000000000)='./file0\x00', r9, &(0x7f0000000040)='./file0\x00', 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000004c0)='system.posix\x9c\t\x00\x00\x00\x00\x00\x00\x00\x00ac\x03n\xf58\x00;d\x19G(5{E\xd5\\\xe79\n\x18\x00Xo\xddq\xec\xf7\x11\x13q\xba\x17\x9b\xb7]R\x9e\x0e\x19\xdc\x8fF\xe7\xfc\xe6\xfai\xd4j\x8cx\xb5\xb9\xa9\xf4\x82\x96\a\xbb\xe9*\xb3\x11\xcez\x9a\x91\xab\xd3m\x95\xfe\xab\xf9\xcc\xb7\x85&\xc0|\f\xd7\xa2 >o\x19/\xd1aC\xd3\xd7\xe5\x8eR', &(0x7f0000000a40)=ANY=[@ANYRES32=0xee01, @ANYBLOB="e62725d97524ceb85863b7c4f8540fe0b4f0832f5bc5d4fc31300b88cfc1b239730a97060ab50a5542a78d6b51e07e8141e658baf63577a3e183901d010abded2004fb4e1385729efed97f9c33fe08655b2e327b629f66f5c8", @ANYPTR, @ANYRES32, @ANYBLOB="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", @ANYBLOB="08000200d29cfee83d23a475b03e384fc393c1f8b1ed0ec0f93400000002e3bfbc927114fa837a9965cf1cf244a69d0fd6fcdce6084e654e5e4cc392d1b25c0da0bcc52ea4bd89b92660988dbb820af038b6d6d4f0d8acf2f4bad14740043303", @ANYRES32=r7, @ANYRES32, @ANYRESDEC=r9], 0x9, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000580)={0xa0, 0xfffffffffffffffe, 0x4, {{0x3, 0x3, 0x2, 0x9, 0x400, 0x20, {0x0, 0x7fffffff, 0x0, 0xffff, 0x2, 0x100000001, 0x0, 0x0, 0x5, 0x1ff, 0x5, r6, r7, 0x9, 0x944}}}}, 0xa0) r10 = getegid() chown(&(0x7f0000000280)='./file0\x00', r6, r10) 23:14:48 executing program 0: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0x5) setuid(r1) r2 = syz_open_procfs(0x0, &(0x7f0000000500)='map_files\x00') fchdir(r2) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = dup2(r3, r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) r8 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/enforce\x00', 0x80800, 0x0) bind$unix(r8, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) writev(r7, &(0x7f0000000000)=[{&(0x7f0000000540)="71dca2e9fd298ee000ae8dfbde6786bb32b7cbc8ca4673f894bf61edcb7d0fd70f0d172f16eca66b52bf1067699dd5e90e39bd96ad6831f18ac194c3ae7637f344537dff7fdab39b92ca391bf3303c3b95e4259cafb0f6d5a34a2c497ebcf736b8a1904a0c87d1a7d29dbab2ecf8f9ab45be19a6410edd56b8d21ff4b789046246e0dd9c943456bb7b72ca2ffae2c313d0a609d7c775b1a4c956e20254e20373b1371d18d510f3ec1a6d6adc1c295bcccc407d44869d6301462349b1779547fc01cc0a145ae0693b24907666a4", 0xcd}, {&(0x7f0000000640)="082c74de4eda9eed2fc28f2d9503f800e3c23dd7c11f02904bfe4759213d6303c1e3523ce11b7c42789ec18882851f64809b7e852551a4328e38ebc16a676250c5f497108a0ac7d37c1db7d12da56c0e139ae534a3617e9391f4da3dc08f03cece10f5f5bfe1e657c1243129406f15f084e5594b9947c4e6879840f102ac0a36fccd926054016521ee0d5f5f8aa316cad72b8c7507e16c94539cb88d2d310cd36c70fe7c1dcbbffd4b616bb55c60cfcb85f0ef85ff9e9c609e959d0230244808c67f", 0xc2}], 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_PAUSE(r10, 0x54a3) ioctl$RTC_EPOCH_SET(r6, 0x4008700e, 0x95dd) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r11 = syz_open_procfs(0x0, &(0x7f0000000140)='maps\x00') preadv(r11, &(0x7f0000000080)=[{&(0x7f00000002c0)=""/169, 0x11}], 0x1, 0x0) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) quotactl(0x2080000201, &(0x7f0000000100)='./file1\x00', 0x0, &(0x7f00000002c0)) 23:14:49 executing program 0: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400, 0x0, 0x0, 0x3f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0x0, @rand_addr="dec527c7c935e681b458a749c94f0d67", 0x1f}}, 0x0, 0x40, 0x0, "30bbe9a78470f1d6562884859d3d21581250a985ab9e45a7f53fe87fd6dc040f7968bb9752242eb7a7a6f318e3fc177d7c894a31fe14035ed68258eec7efd703aeaf50f1fbceea95e691f424d356be9b"}, 0xd8) getsockname(r0, &(0x7f0000000280)=@alg, &(0x7f0000000080)=0x80) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000200), 0xc, 0x0}, 0x4000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x3, [], "516e95de45f9045ab4b38f924c0dfab7"}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000000c0)=0xf, 0x4) fcntl$dupfd(r1, 0x0, r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x3, [], "516e95de45f9045ab4b38f924c0dfab7"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000180000042abd7000fddbdf2502d080072304ff0000120000080005000500000008008700ac1414aa"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x44400) 23:14:49 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) write(r0, &(0x7f0000000100)="bf39f300fb77c955c72618a32cb6e3117dd26e1e5ec2036673aab832c9db47308908d12dd777c2fa68cdabfb5fcc61abba9e5c2ad5b6bbff08b1bb447a87f8a43211a641ab188bc95b4e6a3e9b209fce206d8c540d280ce5a71c6cb468120594788eb96b6870faec7a6390d0e62c97e262f373cbeb033a35813c6ce2778e18fe0fe535a5050df74eee9364b9df2c469f674351b99dbe302c4ab829401113f0b335f95551227cd00c81295efe374c0d12fb683912d48d3710d3b902c89691d7538be7e2", 0xc3) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:49 executing program 0: pipe(&(0x7f0000000100)) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x400, 0x0, 0x0, 0x3f}, 0x0, 0xbfffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x70, 0x669, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) socket$unix(0x1, 0x0, 0x0) r0 = creat(&(0x7f0000000100)='./file0\x00', 0x0) fallocate(r0, 0x0, 0x0, 0x84003ff) setsockopt$inet_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f0000000180)={@in6={{0xa, 0x4e23, 0x0, @rand_addr="dec527c7c935e681b458a749c94f0d67", 0x1f}}, 0x0, 0x40, 0x0, "30bbe9a78470f1d6562884859d3d21581250a985ab9e45a7f53fe87fd6dc040f7968bb9752242eb7a7a6f318e3fc177d7c894a31fe14035ed68258eec7efd703aeaf50f1fbceea95e691f424d356be9b"}, 0xd8) getsockname(r0, &(0x7f0000000280)=@alg, &(0x7f0000000080)=0x80) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000005c0)={&(0x7f0000000200), 0xc, 0x0}, 0x4000) openat$selinux_policy(0xffffffffffffff9c, &(0x7f00000000c0)='/selinux/policy\x00', 0x0, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f0000000000)='IPVS\x00') r1 = openat$selinux_policy(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r1, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x3, [], "516e95de45f9045ab4b38f924c0dfab7"}) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r1, 0x10e, 0x2, &(0x7f00000000c0)=0xf, 0x4) fcntl$dupfd(r1, 0x0, r0) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(0xffffffffffffffff, 0x800c6613, &(0x7f0000000180)=@v2={0x2, @aes256, 0x3, [], "516e95de45f9045ab4b38f924c0dfab7"}) sendmsg$nl_route(0xffffffffffffffff, &(0x7f0000000240)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000180000042abd7000fddbdf2502d080072304ff0000120000080005000500000008008700ac1414aa"], 0x2c}, 0x1, 0x0, 0x0, 0x4000000}, 0x44400) 23:14:49 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800000001, 0x80000000}}, 0x0, 0x0, r1, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = accept$unix(0xffffffffffffffff, 0x0, &(0x7f0000000000)) shutdown(r6, 0x1) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r7 = inotify_init() r8 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r7, &(0x7f00007a8000)) r9 = inotify_add_watch(r7, &(0x7f0000000000)='./control\x00', 0x70) inotify_rm_watch(r7, r9) inotify_rm_watch(0xffffffffffffffff, r9) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:53 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = open$dir(&(0x7f0000000240)='./file0\x00', 0x40000, 0x4) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) ppoll(&(0x7f0000000000)=[{r2, 0x4000}, {r5, 0x8109}], 0x2, &(0x7f00000001c0), &(0x7f0000000200)={0xff}, 0x8) sendfile(r4, r4, 0x0, 0x8800000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) r8 = accept$unix(r7, &(0x7f0000000300)=@abs, &(0x7f00000003c0)=0x6e) ioctl$sock_SIOCOUTQ(r8, 0x5411, &(0x7f0000000400)) ioctl(r4, 0x8, &(0x7f0000000100)="3e2e2bb520c5c8afee241c86249860511bc7aff1828a14a3c3ce08b2ee7b8fd5abd7db6ad59ec3d394de201476ea290691701cca3d478922a01e4a919dd70e1ebda342ccd17037b985ea05bba55da0c9312cb175456f064762c24475ad5f746dddf3344e53405c88024c772175b695db5220ff6aeae831ae15f36be8bf5dbbac9f15948daef20f4b8c17139f28f970c0549ea154136eaf5aad901fe848f10b219b16eae0c9710882d22cbccc1a0aa93af7686220a7da079edceade70") ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$key(r7, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000580)={0x2, 0xb, 0x6f, 0x8, 0x1e, 0x0, 0x70bd27, 0x25dfdbfd, [@sadb_x_sec_ctx={0x15, 0x18, 0x8, 0x81, 0x99, "806aa4fb179aaff807f0a3b1f47250f091322f2ef3bd19894c069b54a6461dff5acf9463bea58f17e8a33f482bcad54a1b9cb3d6c1d43eb9fcd354dbc07b2c00baa2b1a7846f4b313e8a594d71cb822208eeb293bffe7999205d1cfe2a023496e5074e52d1e37e6d8babc85a8789227dfe7151cf3d78482c9df7c59c25f638d07f95879bcf10b8f695780ebfe83792f2bbcb6c45656ff2d08b"}, @sadb_x_filter={0x5, 0x1a, @in6=@initdev={0xfe, 0x88, [], 0x0, 0x0}, @in6=@ipv4={[], [], @multicast1}, 0x2, 0x6, 0x10}, @sadb_sa={0x2, 0x1, 0x4d2, 0x7, 0x40, 0x2d, 0x1, 0x1}]}, 0xf0}}, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:53 executing program 0: socket$nl_route(0x10, 0x3, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) poll(0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200, 0x3090, 0x0, 0x4, 0xf, 0x0, 0xff, 0x0, 0xab}) inotify_add_watch(0xffffffffffffffff, 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) r1 = dup2(0xffffffffffffffff, 0xffffffffffffffff) r2 = inotify_init() inotify_add_watch(r2, &(0x7f0000000040)='./file0\x00', 0x60000094) r3 = inotify_init() r4 = inotify_init() inotify_add_watch(r4, 0x0, 0x60000094) r5 = inotify_init() inotify_add_watch(r5, &(0x7f00000003c0)='./file0\x00', 0x20000844) r6 = inotify_init() inotify_add_watch(r6, 0x0, 0x0) inotify_init() openat$apparmor_thread_current(0xffffffffffffff9c, 0x0, 0x2, 0x0) r7 = openat$apparmor_task_current(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/self/attr/current\x00', 0x2, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000003c0)='./file0\x00', 0x20000844) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x60000094) r8 = inotify_init1(0x0) fcntl$setown(r8, 0x8, 0xffffffffffffffff) fcntl$getownex(r8, 0x10, 0x0) ptrace(0xffffffffffffffff, 0x0) r9 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/enforce\x00', 0x40, 0x0) getsockopt$inet_IP_IPSEC_POLICY(r9, 0x0, 0x10, &(0x7f0000000680)={{{@in6=@remote, @in=@broadcast}}, {{@in=@initdev}, 0x0, @in6=@mcast2}}, 0x0) setgroups(0x0, 0x0) getegid() setgroups(0x0, &(0x7f0000000200)) r10 = inotify_init() inotify_add_watch(r10, &(0x7f0000000040)='./file0\x00', 0x0) socket$inet_udplite(0x2, 0x2, 0x88) sendmsg$unix(r1, &(0x7f0000000a80)={&(0x7f0000000380)=@abs={0xbf59b6a4f151248b, 0x0, 0x4e22}, 0x6e, &(0x7f0000000000)=[{0x0}, {&(0x7f00000004c0)="454171f6220b7d8601ad2ab9d2e88a3241a5afba8dc2cc8f9368b39c0106627593a43a0a527ce59f97ea3cb536af142b84139f0032696e8b378dfb649851acac94104cbbc7bc1ad2d994f3df51867c4e477ad0784a9544e52d464a9445c08a67b66a171d13019a1e00ccca6d9b056d7f307f1b929aec5231f5552fe3bec653b08bda274cf5cabc40b75d62502b0dc35f9ff975b7f0b984f6106ecaeef48e93c114f352a051f7b6eadc", 0xa9}], 0x2, &(0x7f0000000200)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32=r0, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r3, @ANYRES32=r4, @ANYRES32=r5, @ANYBLOB="800000003800000000000000010000", @ANYRES32=r6, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="0000000200000000", @ANYRES32, @ANYRES32, @ANYRES32=r7, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=r0, @ANYBLOB="1d00083883bc51200b8d4d12bc950d25c4412ee65013837f917565494db0916240e6de8d48186fd7b167732e1b380181369313ef4675dcc7c50c5f4f", @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c0000000000000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="0000000018000000000000", @ANYRES32, @ANYRES32=r10, @ANYPTR64, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="bdef7b625620d4c4b7be903813f6c68c5adde40f61b737a8347c764e66a6ceaf164facf863ca335d91a2b7d520b9f84d5bc5719efd8eac432c7a4d939b"], 0x16b, 0x40000}, 0x4) rename(0x0, &(0x7f0000000040)='./file0\x00') socket$inet(0x10, 0x2, 0x0) 23:14:53 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:14:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/attr/exec\x00', 0x2, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[], 0xa49c) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:53 executing program 4: r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/net/pfkey\x00', 0x608000, 0x0) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f00000000c0)='syz1\x00') sendto(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) sysinfo(&(0x7f0000000040)=""/22) sendmsg(0xffffffffffffffff, &(0x7f0000000180)={0x0, 0xfffffff0, &(0x7f0000000000), 0x3cf}, 0x10) socket$nl_netfilter(0x10, 0x3, 0xc) ioctl$sock_inet_SIOCGIFADDR(r0, 0x8915, &(0x7f0000000100)={'\a\x00\x00\x01\x00', {0x2, 0x4e04, @multicast2}}) r1 = socket$inet(0x10, 0x2, 0x0) ioctl$sock_ifreq(r1, 0x89f1, &(0x7f0000000180)={'ip6_vti0\x00\x14\xea:\x01\x00\x00\x01', @ifru_flags=0x2}) ioctl$PPPIOCATTACH(0xffffffffffffffff, 0x4004743d, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x0) 23:14:53 executing program 4: close(0xffffffffffffffff) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000100)='net/softnet_stat\x00') openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/fscreate\x00', 0x2, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='net/psched\x00') ioctl$EVIOCGABS0(r0, 0x80184540, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6(0xa, 0x2, 0x0) ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PPPIOCSFLAGS1(0xffffffffffffffff, 0x40047459, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x800007f, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0xffffffffffffffff, 0x0, @ipv4={[], [], @dev}}, 0x1c) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) r1 = gettid() r2 = creat(&(0x7f0000000280)='./file0\x00', 0x1) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[@ANYBLOB="23be68d373c8000000001250d3a10fd630600000ad44a335b696b6868313b60e0cf59e7a188a1927f461a393bdbf399be67cd1f1"], 0x34) close(r2) clone(0x2000100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) execve(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) ptrace$setopts(0x4206, r1, 0x0, 0x0) 23:14:53 executing program 0: r0 = open(&(0x7f00000009c0)='./bus\x00', 0x141042, 0x0) mmap(&(0x7f0000001000/0xa000)=nil, 0xa000, 0x800002, 0x11, r0, 0x0) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) r1 = creat(&(0x7f00000002c0)='./bus\x00', 0x0) fcntl$setstatus(r1, 0x4, 0x6100) ftruncate(r1, 0x8200) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x2000002) write$ppp(r2, &(0x7f0000000080)="ea8a6bdc0cbfafbdb2b8a4147fe43e6f882c1ce9acefe6f4473ae2d9db64f70971e5b6b14087344640b3d87c2eb26bcf6396472172d24c0ddf29e72842bf21ab", 0x40) recvmmsg(0xffffffffffffffff, &(0x7f00000052c0)=[{{0x0, 0x0, &(0x7f0000001b80)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f00000035c0)=[{0x0}], 0x1, &(0x7f0000003680)=""/187, 0xbb}}], 0x2, 0x0, &(0x7f0000005480)) r3 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) ioctl$FS_IOC_RESVSP(r3, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) r4 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000040), 0xc) fcntl$dupfd(r4, 0x0, r5) perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x509, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$cgroup_type(r1, &(0x7f0000000200)='threaded\x00', 0x175d900f) setreuid(0x0, 0x0) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r6, r6, 0x0, 0x8800000) epoll_ctl$EPOLL_CTL_DEL(0xffffffffffffffff, 0x2, r6) pipe(0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000), &(0x7f0000cab000)=0x310) getresuid(&(0x7f0000004180), 0x0, 0x0) 23:14:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:53 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:53 executing program 4: r0 = creat(0x0, 0x34) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/member\x00', 0x2, 0x0) fcntl$dupfd(r1, 0x0, r0) socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x18) ftruncate(r4, 0x10001) keyctl$set_timeout(0xf, r3, 0x0) r5 = add_key$keyring(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r5, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895a3eaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0xc, 0x0, 0x0) 23:14:53 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x100000000018, 0x0, 0x4) dup3(r0, r1, 0x0) r2 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000300)='IPVS\x00') sendmsg$IPVS_CMD_ZERO(r1, &(0x7f0000000480)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f0000000340)={&(0x7f00000003c0)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000326bd7000fcdbdf25100000002400020008000700de0900000800030002f6ffff070003000100000008000d000100000008000400798600000c0002000800050008000000080006000b000000"], 0x54}, 0x1, 0x0, 0x0, 0x800}, 0x40) fallocate(0xffffffffffffffff, 0x2, 0x0, 0x2e) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x39) r8 = socket(0x100000000018, 0x0, 0x4) connect(r8, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) setsockopt$packet_fanout(r8, 0x107, 0x12, &(0x7f00000004c0)={0x9, 0x658c8c25563950e5, 0xb000}, 0x4) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r9, r9, 0x0, 0x8800000) sendfile(r9, r6, 0x0, 0x35b3) r10 = openat(r7, &(0x7f0000000280)='./file0\x00', 0x20000, 0x2) ioctl$LOOP_CLR_FD(r10, 0x4c01) recvfrom(r4, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) rt_sigaction(0x0, &(0x7f0000000140)={&(0x7f0000000000)="44c14b860536f0ff0c48c4417b129c7f6900000026647f08c4824da84b00c4e3815ff254c4a2790e5e1b0f3803d9c44271be12400f92beee45e207", {0x40}, 0x10000004, &(0x7f0000000100)="f3410f7041540345fec1c4c1d973d802c4a3196e6d62046465f34d0f2c23c4c1c95419c463fd09ce3ec423f14269fe65c4c2f9a68f00100002660f75f1"}, &(0x7f0000000200)={&(0x7f0000000180)="c4411459f4c421f9108800000000440f3a0fa44c0000008009660f3a22c50e0f3a0f520f00c4e21dbaf3f2460f5c073e26a5660f11340ec4e1b0558219000000", {}, 0x0, &(0x7f00000001c0)="8132cc1d4264f0fe40ec6543dabf00000021f3410f1ad936f20ff02ac4837bf00241c443d96eb2f8440000c5c482c13902c4e2f91e8100000000c48245bb14c3"}, 0x8, &(0x7f0000000240)) 23:14:53 executing program 4: r0 = creat(0x0, 0x34) r1 = openat$selinux_member(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/member\x00', 0x2, 0x0) fcntl$dupfd(r1, 0x0, r0) socket$packet(0x11, 0x3, 0x300) socket$inet6_tcp(0xa, 0x1, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r2, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r2, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r2, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r3 = add_key$keyring(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r3) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, 0x0) r4 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$TIOCSETD(0xffffffffffffffff, 0x5423, &(0x7f0000000000)=0x18) ftruncate(r4, 0x10001) keyctl$set_timeout(0xf, r3, 0x0) r5 = add_key$keyring(0x0, &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, r5, 0x0) setsockopt$sock_int(r2, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r2, &(0x7f00000012c0)="20268a927f1f6588b967481241ba7860f46ef65ac618ded8974895a3eaf4b4834ff922b3f1e0b02bd67aa03059bcecc7a95c25a3a07e758044ab", 0x3a, 0xc, 0x0, 0x0) 23:14:54 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000000080), 0x0, 0x0, 0x0) clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000a80), 0xfffffffffffffffd) r0 = socket$inet(0x2, 0x4000000000000001, 0x0) write$cgroup_type(0xffffffffffffffff, &(0x7f00000002c0)='threaded\x00', 0x9) sendto$inet(r0, 0x0, 0xfffffffffffffd49, 0x0, 0x0, 0xb2) openat$ashmem(0xffffffffffffff9c, 0x0, 0x0, 0x0) keyctl$KEYCTL_CAPABILITIES(0x1f, 0x0, 0x0) creat(0x0, 0x0) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) open(&(0x7f0000000240)='./bus\x00', 0x22000, 0x10) r1 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_route(r1, &(0x7f0000000140)={0x0, 0x0, 0x0}, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) sendmsg$IPVS_CMD_SET_SERVICE(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0xc3}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x5c, 0x0, 0x800, 0x70bd29, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_SERVICE={0x20, 0x1, [@IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x2, 0xc}}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}, @IPVS_SVC_ATTR_PROTOCOL={0x8, 0x2, 0x46}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, [@IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x2}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, [@IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x1}, @IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x3}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1000}]}, 0x5c}, 0x1, 0x0, 0x0, 0x4000}, 0x463a7a6881694d38) r4 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r4, 0x400454ca, &(0x7f0000000000)={'vat\x00\x00\x00\x00\x00\x00\x00\xa8\x03\x00', 0x43732e5398416f1a}) close(r4) dup2(0xffffffffffffffff, r4) faccessat(0xffffffffffffffff, 0x0, 0x7, 0x0) 23:14:54 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) r3 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:14:54 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) pipe(&(0x7f0000000000)={0xffffffffffffffff}) r3 = getuid() setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in=@initdev={0xac, 0x1e, 0x1, 0x0}, @in=@remote, 0x4e24, 0xffff, 0x4e20, 0x1000, 0x0, 0x10, 0x20, 0xc45450f2f4522167, 0x0, r3}, {0xde99, 0x80000001, 0x3f, 0x0, 0x5, 0x6, 0xed, 0x7}, {0x5, 0xfffffffeffffffff, 0x7, 0x99f4}, 0x2f, 0x6e6bbd, 0x0, 0x0, 0x2, 0x6424c07b73f46a55}, {{@in6=@mcast2, 0x4d2, 0xff}, 0xa, @in=@broadcast, 0x3501, 0x4, 0x3, 0x30, 0x5, 0x3f, 0x6aed}}, 0xe8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:54 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x9, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 23:14:54 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$cgroup(r3, &(0x7f0000000000)='syz0\x00', 0x200002, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) r6 = open(&(0x7f00000001c0)='./file0\x00', 0x20900, 0x61) write$UHID_INPUT(r6, &(0x7f0000000680)={0x8, "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", 0x1000}, 0x1006) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x4}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r5}}, {@uid_lt={'uid<', r7}}, {@smackfstransmute={'smackfstransmute'}}]}) fsetxattr$security_capability(r4, &(0x7f0000000100)='security.capability\x00', &(0x7f0000000140)=@v3={0x3000000, [{0xffffffe8, 0x1}, {0xfffff001, 0x8}], r5}, 0x18, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 456.961774] audit: type=1400 audit(1574723694.242:21): avc: denied { sys_admin } for pid=24629 comm="syz-executor.0" capability=21 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=cap_userns permissive=1 23:14:54 executing program 4: openat$zero(0xffffffffffffff9c, 0x0, 0x400001, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x1000000000000001, 0x70, 0x5, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0x5}}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x220b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x8000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0xffffffffffffffff, 0x11, r1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$IP_VS_SO_SET_STARTDAEMON(0xffffffffffffffff, 0x0, 0x48b, &(0x7f0000000180)={0x0, 'team_slave_0\x00', 0x4}, 0x18) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, r1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PPPIOCGDEBUG(r4, 0x80047441, &(0x7f0000000300)) r5 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r5, &(0x7f0000000140)={0x2, 0x4e21, @broadcast}, 0x10) r6 = creat(&(0x7f00000000c0)='./file0\x00', 0x80) fstatfs(r2, &(0x7f0000000480)=""/4096) sendto$inet(r5, 0x0, 0x10b, 0x200007fe, &(0x7f0000000100)={0x2, 0x10004e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) signalfd(r5, &(0x7f00000001c0)={0x7fff}, 0x8) r7 = socket$inet_tcp(0x2, 0x1, 0x0) writev(r7, &(0x7f00000002c0)=[{&(0x7f0000000200)="f7f506670d7b18161bc3eb2565414e4612eb68389ad39720a41ca4eed4ca9b612b473e60035e3231749229bbbaa79752edb1555e78aa4ebce949565823529c58594a25bc2230fcd1cecb0c12d166c84292efe438f26e2ea9f44c", 0x5a}, {&(0x7f0000001480)="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", 0x1000}, {&(0x7f0000000280)="7534d708b6509f181818d8d6bac81f4b8c5b740888e034c3fb2a3bb7", 0x1c}], 0x3) sendto$inet(r5, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0xfffffffffffffe98) ioctl$LOOP_CTL_GET_FREE(r6, 0x4c82) 23:14:54 executing program 4: write$P9_RLCREATE(0xffffffffffffffff, &(0x7f0000000000)={0x18, 0xf, 0x1, {{0x20, 0x4, 0x7}, 0x9}}, 0x18) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$binfmt_script(r0, &(0x7f0000000580)={'\x00?\x00', './file0', [{0x20, '#! '}], 0xa, "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"}, 0x30) sendfile(r0, r0, &(0x7f0000000200), 0xa198) r1 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000080)='/selinux/status\x00', 0x0, 0x0) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r1, &(0x7f00000002c0)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0xc0000100}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x38, r2, 0x200, 0x70bd27, 0x25dfdbfc, {}, [@SEG6_ATTR_SECRET={0xc, 0x4, [0x8, 0x4]}, @SEG6_ATTR_SECRET={0x18, 0x4, [0x2755, 0x4, 0x74ac, 0x1000, 0x9]}]}, 0x38}, 0x1, 0x0, 0x0, 0x80}, 0x405c892) 23:14:54 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000240)='/dev/input/event#\x00', 0x0, 0x200000) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY(r0, 0xc0406618, &(0x7f0000000280)={{0x2, 0x0, @identifier="e403b95ea027d5bf3141959b7d6536da"}}) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = socket$inet6(0xa, 0x800, 0x2) getsockopt$IP_VS_SO_GET_INFO(r3, 0x0, 0x481, &(0x7f00000002c0), &(0x7f0000000300)=0xc) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x100000000018, 0x0, 0x4) connect(r6, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) r7 = accept$packet(r6, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random}, &(0x7f0000000100)=0x14) fsetxattr$security_smack_transmute(r7, &(0x7f0000000140)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000180)='TRUE', 0x4, 0x7) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f00000001c0)={0x0, @rand_addr, @multicast1}, &(0x7f0000000200)=0xc) 23:14:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000000)='net/tcp\x00') bpf$BPF_PROG_GET_FD_BY_ID(0xd, &(0x7f0000000480), 0xc) r3 = gettid() ptrace$setopts(0x4206, r3, 0x0, 0x0) tkill(r3, 0x39) ptrace$setregs(0xd, r3, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r3, 0x0, 0x0) syz_open_procfs(r3, &(0x7f00000004c0)='net/raw\x00') r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = bpf$PROG_LOAD(0x5, &(0x7f0000000700)={0x10, 0x7, &(0x7f0000000500)=@framed={{0x18, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x6}, [@exit, @exit, @exit, @generic={0x9, 0x4, 0xd, 0x6, 0xffffffff}]}, &(0x7f0000000580)='syzkaller\x00', 0x4000000, 0x82, &(0x7f00000005c0)=""/130, 0x0, 0x2, [], 0x0, 0x7, 0xffffffffffffffff, 0x8, &(0x7f0000000680)={0x0, 0x4}, 0x8, 0x10, &(0x7f00000006c0)={0x1, 0x7, 0x0, 0x7ff}, 0x10}, 0x70) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$UHID_CREATE2(r8, &(0x7f0000000240)=ANY=[@ANYBLOB="0b00000073797a310000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a3000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000073797a31000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000d5000300040000000800000004000000090000008f5d267a1a4345143405b1b42f445ea9fbd6ed02e0e0495f8aa21ac94b665c08dd0438c776105a292602b2a813b7ebf3093438c4560e125fab57c766e5f84d67d8c511ba3b961c1e4c9863b97ed6cf66ceee5459f77d25ed2026013524ae2290b4c1a522b8eeb03c5622343c33a0e642d4cc95630548c4778122537fd74a8510292d1f45151d2c034ba0c444be437354618555de9dc550f5e732b54e547e66dc4b9052ecd266b760cbf328f1deaab27132564e185dded18e2fb2cb72c85d01b335cd34ad5abb16474fae013646c3d1c6"], 0x1ed) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r9) recvfrom$unix(r9, &(0x7f0000000100)=""/121, 0x79, 0x40, &(0x7f0000000180)=@file={0x1, './file0\x00'}, 0x6e) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:58 executing program 4: setitimer(0x2, &(0x7f0000000040)={{}, {0x5}}, 0x0) getitimer(0x2, &(0x7f0000001140)) gettid() r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x80}]}) open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x10c) r2 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x1f, 0x80}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r3, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)={0x258, 0x0, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x27a, @empty, 0x2373}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x42d8, @local, 0x4}}}}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x376fa88a}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7}, 0x4, 0x200000000000000, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r4 = socket(0x100000000018, 0x0, 0x4) connect(r4, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r5, 0x49e, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x800}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xd1d4e71f702065b9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x800}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x34}]}, 0x7c}, 0x1, 0x0, 0x0, 0xa1aca758b4f4d045}, 0x20000000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x20032600) 23:14:58 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000)=0x1000, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x82400, 0x0) ioctl$RTC_VL_CLR(r4, 0x7014) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:58 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) r3 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:14:58 executing program 0: perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clock_getres(0x9, 0x0) openat$cgroup_procs(0xffffffffffffffff, 0x0, 0x2, 0x0) clone(0x70024100, 0x0, 0x0, 0x0, 0x0) 23:14:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:58 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x8) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) fcntl$addseals(r3, 0x409, 0x8) r4 = dup(r2) r5 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x10000, 0x0) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) futimesat(r5, &(0x7f0000000100)='./file0\x00', &(0x7f0000000180)={{}, {r6, r7/1000+10000}}) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:58 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:14:58 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) setsockopt$IP_VS_SO_SET_STARTDAEMON(r3, 0x0, 0x48b, &(0x7f0000000100)={0x5, 'sit0\x00', 0x2}, 0x18) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) dup3(r2, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r8) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r10 = dup(r9) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) bind$inet(r10, &(0x7f00000001c0)={0x2, 0x4e23, @local}, 0x10) ioctl$SIOCGSTAMP(r8, 0x8906, &(0x7f0000000000)) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x100004001fb) recvfrom(r1, &(0x7f0000000040)=""/184, 0xfffffff8, 0x40012500, 0x0, 0xffffffffffffff49) ptrace(0x4217, 0xffffffffffffffff) 23:14:59 executing program 4: setitimer(0x2, &(0x7f0000000040)={{}, {0x5}}, 0x0) getitimer(0x2, &(0x7f0000001140)) gettid() r0 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r0, 0x4b67, 0x0) syz_genetlink_get_family_id$nbd(&(0x7f0000000080)='nbd\x00') r1 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000300)='/selinux/mls\x00', 0x0, 0x0) ioctl$PIO_UNIMAP(r1, 0x4b67, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x0, 0x80}]}) open(&(0x7f00000000c0)='./file0\x00', 0x8000, 0x10c) r2 = openat$selinux_mls(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$PIO_UNIMAP(r2, 0x4b67, &(0x7f0000000100)={0x1, &(0x7f00000000c0)=[{0x1f, 0x80}]}) openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) write$binfmt_script(r3, 0x0, 0x0) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000240)='security.selinux\x00', &(0x7f0000000280)='system_u:object_r:iptables_unit_file_t:s0\x00', 0x2a, 0x0) close(0xffffffffffffffff) socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_BEARER_GET(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000180)={&(0x7f0000000540)={0x258, 0x0, 0x20, 0x70bd2d, 0x25dfdbfd, {}, [@TIPC_NLA_MEDIA={0x60, 0x5, [@TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x6}]}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x7}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xfff}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}]}, @TIPC_NLA_BEARER={0xc8, 0x1, [@TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'batadv0\x00'}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @l2={'ib', 0x3a, 'hwsim0\x00'}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80}]}, @TIPC_NLA_BEARER_PROP={0x3c, 0x2, [@TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x40}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x5}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x27a, @empty, 0x2373}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x42d8, @local, 0x4}}}}]}, @TIPC_NLA_BEARER={0x40, 0x1, [@TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x5}]}, @TIPC_NLA_BEARER_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x2000}, @TIPC_NLA_PROP_WIN={0x8}]}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xa}]}]}, @TIPC_NLA_SOCK={0x28, 0x2, [@TIPC_NLA_SOCK_REF={0x8, 0x2, 0x1ff}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x376fa88a}, @TIPC_NLA_SOCK_ADDR={0x8}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x2}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'ib\x00'}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x200}]}]}, @TIPC_NLA_LINK={0x90, 0x4, [@TIPC_NLA_LINK_PROP={0x2c, 0x7, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80000000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x81a}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1a}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x1f}]}, @TIPC_NLA_LINK_PROP={0x3c, 0x7, [@TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8000}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x15}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_PRIO={0x8}, @TIPC_NLA_PROP_PRIO={0x8}]}, @TIPC_NLA_LINK_PROP={0x4}, @TIPC_NLA_LINK_NAME={0xc, 0x1, 'syz0\x00'}, @TIPC_NLA_LINK_PROP={0x14, 0x7, [@TIPC_NLA_PROP_WIN={0x8}, @TIPC_NLA_PROP_TOL={0x8}]}]}]}, 0x258}, 0x1, 0x0, 0x0, 0x4000000}, 0x2) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x7}, 0x4, 0x200000000000000, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) r4 = socket(0x100000000018, 0x0, 0x4) connect(r4, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) r5 = syz_genetlink_get_family_id$nbd(&(0x7f00000002c0)='nbd\x00') sendmsg$NBD_CMD_DISCONNECT(r4, &(0x7f0000000400)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x40020}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x7c, r5, 0x49e, 0x70bd2d, 0x25dfdbfd, {}, [@NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x4}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x800}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0xd1d4e71f702065b9}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x800}, @NBD_ATTR_DEAD_CONN_TIMEOUT={0xc, 0x8, 0x1}, @NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_BLOCK_SIZE_BYTES={0xc, 0x3, 0x8}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_TIMEOUT={0xc, 0x4, 0x34}]}, 0x7c}, 0x1, 0x0, 0x0, 0xa1aca758b4f4d045}, 0x20000000) setsockopt$inet6_int(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) r6 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f00000000c0)='memory.events\x00', 0x26e1, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r6, 0x40086602, 0x400007) r7 = openat$cgroup_ro(0xffffffffffffff9c, &(0x7f0000000140)='memory.events\x00', 0x7a05, 0x1700) write$cgroup_subtree(r6, &(0x7f0000000100)=ANY=[], 0xff4a) write$cgroup_subtree(r7, &(0x7f0000000000)=ANY=[], 0x20032600) 23:14:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x4, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000000000007f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:59 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) sendfile(r0, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000000)) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) prctl$PR_SET_TIMERSLACK(0x1d, 0x5) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:14:59 executing program 0: ioctl$FIDEDUPERANGE(0xffffffffffffffff, 0xc0189436, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) connect$inet6(0xffffffffffffffff, 0x0, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) write$binfmt_misc(r0, &(0x7f0000000440)={'syz0', "8fb475e22c2da02fefb045394d696cf22d1099e69fe024976c96ac57ce02e4bfd56714ea298001142593ea9f5e9d0425d6c8a81600c2fb6f3214a28e6b1ac1807b4ebbeb5c7354e03df421df88b5289582d23429631b1cbf95ccb199e0278896f8cce8dc10f1edf2aa7f07f58de5824f0a53482b819f111ca09f7182d444375824cbdbe314ab28cd70a24e0d791a07babb84c0b3294a2d4ba850de49ae9f59ac7baa6b290ae611bd956fd13e563f2e522014bdbfe5347be274f394e195f3978db161ad4287ca0741b329a0b14c79cf5bf7a1028d842099ebc4dc918bb170332e5556313affb93522ecf951628e5c"}, 0xf2) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) fstat(r1, &(0x7f0000000540)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x8001}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setxattr$security_capability(&(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r3 = syz_open_dev$binderN(0x0, 0x0, 0x0) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x18082) ioctl$sock_inet6_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f00000000c0)) ioctl$BINDER_WRITE_READ(r3, 0xc0306201, &(0x7f0000000240)={0x54, 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="056304400000000011634840000000000000000000000000000000000000000000000000000000000000000058000000000000001800000000000000", @ANYPTR=&(0x7f0000000280)=ANY=[@ANYBLOB="852a68730000000000000000000000000000000000000000852a7470000000000000000000000000000000000000000000000000000000002900000000000000852a687300"/88], @ANYPTR=&(0x7f0000000140)=ANY=[@ANYBLOB="000000000000000018000000000000004000000000000000"], @ANYBLOB="0a1803220000a30fb001ab945b44a3230288a404003f5b47c05af486f019498c522f2127a7841665080748b7a084c8b5461de5fe57539ed1dc971f65356e5122def4bf941ed2391ad7466cced163556ef5e9c40fc5ec6cd43d36d7bd6f6d164a8a0eb5c857a384290c8dd123c3d3bff08a9c1913739db41d72730532b8d8cdb73e1a6c8e585b95a1b533358f23e0885ef92d44247f5f60ec1f365cd0ec2f97e41839e4cc5a07ed6376e83892a8d29dd4ff4e1a757c3446e443d7aadefc69453f588e7c00b18f12819cf9ae25c36a9e129907dbf08a9bb500"/230], 0x0, 0x0, 0x0}) setgid(r2) 23:14:59 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(0xffffffffffffffff, 0x8, r2) r3 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:14:59 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$selinux_policy(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/policy\x00', 0x0, 0x0) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000140)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ADD(r2, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000580)={0x2a0, r3, 0x400, 0x70bd2a, 0x5, {}, [@TIPC_NLA_NODE={0x24, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MEDIA={0xe0, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0xfcbd}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x9}]}, @TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x13}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}]}, @TIPC_NLA_MEDIA_PROP={0x2c, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x7}]}, @TIPC_NLA_MEDIA_PROP={0x1c, 0x2, [@TIPC_NLA_PROP_MTU={0x8, 0x4, 0x3}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x17}]}, @TIPC_NLA_MEDIA_PROP={0x44, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0xb}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1b}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xa9f5}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x1f}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1c}]}]}, @TIPC_NLA_BEARER={0x108, 0x1, [@TIPC_NLA_BEARER_NAME={0x18, 0x1, @l2={'ib', 0x3a, 'veth1_to_bond\x00'}}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x958d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x80}, @TIPC_NLA_PROP_MTU={0x8}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x80000000}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x1}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x6}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0xffe6}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0xffffffff}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x1d}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x19}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x4}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x6}]}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x9}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x7, @remote, 0x5}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x40, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x6}}}}]}, @TIPC_NLA_BEARER={0x80, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e20, 0x4, @loopback, 0x99}}, {0x14, 0x2, @in={0x2, 0x4e22, @loopback}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x0, @dev={0xfe, 0x80, [], 0x1b}, 0x7}}, {0x20, 0x2, @in6={0xa, 0x4e20, 0x3, @ipv4={[], [], @multicast1}, 0x1}}}}]}]}, 0x2a0}, 0x1, 0x0, 0x0, 0x20048840}, 0x4084000) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 462.456241] binder: 24965:24967 Acquire 1 refcount change on invalid ref 0 ret -22 [ 462.492522] binder: 24965:24967 transaction failed 29189/-22, size 88-24 line 3138 23:14:59 executing program 0: prlimit64(0x0, 0x0, &(0x7f0000000280)={0x9, 0x8d}, 0x0) sched_setattr(0x0, &(0x7f0000000040)={0x30}, 0x0) pipe(&(0x7f0000000200)) rmdir(0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f00000000c0)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x4, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfcca, 0xffffffff}, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x100000000018, 0x0, 0x4) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) r1 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000080)='TIPCv2\x00') sendmsg$TIPC_NL_BEARER_ENABLE(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x600008}, 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x80, r1, 0x20, 0x70bd25, 0x25dfdbff, {}, [@TIPC_NLA_SOCK={0x34, 0x2, [@TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_REF={0x8, 0x2, 0x9}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x101}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x4}, @TIPC_NLA_SOCK_HAS_PUBL={0x4}, @TIPC_NLA_SOCK_ADDR={0x8, 0x1, 0x200}]}, @TIPC_NLA_NODE={0x2c, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xf03}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x3}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0xac4}, @TIPC_NLA_NODE_ADDR={0x8}]}, @TIPC_NLA_MON={0xc, 0x9, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x2}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) socket(0x0, 0x0, 0x0) r2 = socket$packet(0x11, 0x3, 0x300) sendmmsg$inet(r2, 0x0, 0x0, 0x0) clone(0x103, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) r3 = socket$inet6(0xa, 0x3, 0x6) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r3, 0x29, 0x20, &(0x7f0000000040)={@loopback, 0x0, 0x0, 0x2}, 0x20) r4 = syz_open_procfs(0x0, &(0x7f0000000600)='net/ip6_flowlabel\x00n\xc01\x14\x894X\xed\xc1\xc9\xd8\xdcK\r\x8d\xae\x98&@\xd0\xe6\xbbQ\xd7\xffYn\x1c\x92\xde\x0e\xaa1\x91\x98\xe9\x1f\nMCi|+\xcdw\xf0\x176Z\xf1`\xac\xf3;\xd6d2\xeb\xe5\f\x0e\x8b\xda\xf7\xfc9\xfe\xff4\xef\'\xa19q\x93\"\x7fG3\xc1E\xe6e6\xc6\xc2u\x11% \xe7+0\x97\x84;\\\xda\xc4\x80\xc3\xb18N\xbfY%\x05\xf8\x85\x89\xfc\xd2\xd7') sendfile(r3, r4, 0x0, 0x4000000000dc) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={0x0}}, 0x40801) [ 462.537373] binder: undelivered TRANSACTION_ERROR: 29189 23:14:59 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0xffffffffffffffff) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x3, 0x3, 0xff, &(0x7f0000000180)={0xffffffffffffffff}) r4 = socket$nl_route(0x10, 0x3, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r8, r8, 0x0, 0x8800000) r9 = syz_open_dev$evdev(&(0x7f0000000100)='/dev/input/event#\x00', 0x3, 0x4000) sendfile(r8, r9, 0x0, 0xa800000) openat(r6, &(0x7f0000000000)='./file0\x00', 0x0, 0x14b) getsockname$packet(r3, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0xfffffffffffffece) sendmsg$nl_route_sched(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) sendmsg$nl_route(r3, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x20004000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)=@bridge_delneigh={0x48, 0x1d, 0x106, 0x70bd2c, 0x25dfdbff, {0x7, 0x0, 0x0, r10, 0x112, 0x22, 0x9}, [@NDA_LINK_NETNSID={0x8, 0xa, 0x3f}, @NDA_VLAN={0x8, 0x5, 0x4}, @NDA_MASTER={0x8, 0x9, 0x7f}, @NDA_CACHEINFO={0x14, 0x3, {0x7ff, 0x9, 0x4, 0x2}}]}, 0x48}, 0x1, 0x0, 0x0, 0x40010}, 0x4800) r11 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) ioctl$PPPIOCGFLAGS1(r13, 0x8004745a, &(0x7f0000000340)) 23:14:59 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_mreqsrc(r0, 0x0, 0x27, &(0x7f0000000340)={@dev={0xac, 0x14, 0x14, 0x1b}, @local, @empty}, 0xc) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x378}], 0x100000c7, 0x0) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/mcfilter\x00') r2 = socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) accept$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000080)=0x14) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000200)={{{@in=@multicast2, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in6=@empty}}, &(0x7f00000000c0)=0xe8) setsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000380)={{{@in=@remote, @in=@initdev={0xac, 0x1e, 0x1, 0x0}, 0x4e21, 0x7fff, 0x4e21, 0x1000, 0x0, 0x180, 0x80, 0x3a, r5, r6}, {0x0, 0x6, 0x101, 0xd5c, 0x8, 0x29, 0x1, 0x8000}, {0x3, 0x8, 0x2, 0x6}, 0x7fffffff, 0x6e6bbb, 0x1, 0x1, 0x2, 0x3}, {{@in6=@mcast2, 0x4d6, 0x6c}, 0x2, @in6=@rand_addr="6d8fe2597c6be9819875ce0ae8b8eccf", 0x3505, 0x4, 0x0, 0x1, 0xffffffff, 0x29b1, 0xdb}}, 0xe8) preadv(r1, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) 23:15:00 executing program 4: syz_open_dev$sndtimer(&(0x7f00000001c0)='/dev/snd/timer\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket(0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) setsockopt$inet6_group_source_req(0xffffffffffffffff, 0x29, 0x0, 0x0, 0x0) accept$inet6(0xffffffffffffffff, 0x0, 0x0) getpid() r1 = creat(&(0x7f0000000000)='./bus\x00', 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) perf_event_open(0x0, r2, 0x0, 0xffffffffffffffff, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) open(0x0, 0x0, 0x0) ftruncate(r1, 0x8200) r3 = socket$inet(0x2, 0x200000002, 0x0) r4 = dup2(r3, r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$TCSETAF(0xffffffffffffffff, 0x5408, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, 0x0, 0x349) mmap(&(0x7f0000008000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) lstat(0x0, 0x0) removexattr(0x0, 0x0) r5 = socket$inet6(0xa, 0x400000000001, 0x0) ioctl$int_in(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r6 = dup(r5) setsockopt$inet6_tcp_int(r6, 0x6, 0x20000000000002, &(0x7f00007b1000)=0x81, 0x4) prctl$PR_GET_CHILD_SUBREAPER(0x25) r7 = socket$inet(0x2, 0x1, 0x0) bind$inet(r7, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r7, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r8 = socket(0x100000000018, 0x0, 0x4) dup3(r7, r8, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x25, &(0x7f0000000200)=0x806, 0x16b) bind$inet6(r5, &(0x7f0000000180)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendto$inet6(r5, 0x0, 0x0, 0x20000008, &(0x7f00008d4fe4)={0xa, 0x4e20, 0x0, @loopback}, 0x2b9) r9 = open(&(0x7f0000002000)='./bus\x00', 0x0, 0x80) sendfile(r6, r9, 0x0, 0x8000fffffffe) 23:15:03 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6(0xa, 0x2, 0x0) fsetxattr$trusted_overlay_upper(0xffffffffffffffff, &(0x7f0000000000)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="00fbbd0102f46f6a9cd9f485925cf76a3790708d01247a1b42d3c778b264757db28e9cef05328a71d81d5282d698c7105f254b5ac438e611b8410e8e01c25e27b510cefc24002e7d8e20515215418328a2ca3ab5a44277553639f5cc446df3003b37f82e2ef9391b2d2b200f22892215deda1289eb9362f5324851b7ed8273bb4011e61d703e1e42a7ff00dfd8c8f3e68a0e131bf735cca357ae220582c396ca39bef239b42673c3484785ec82f8f9ace3024a189463"], 0x1, 0x0) connect$inet6(r0, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) r1 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, 0x0, 0x1, 0x0) fcntl$lock(0xffffffffffffffff, 0x7, &(0x7f0000000600)={0x2}) setfsuid(0x0) mount$fuse(0x0, &(0x7f0000000240)='./file0/file0\x00', &(0x7f0000000280)='fuse\x00', 0x1000000, &(0x7f0000001600)=ANY=[@ANYBLOB='fd=', @ANYRESHEX, @ANYBLOB=',rootmode=000000000000000000:000?,user_id=', @ANYRESDEC=0x0, @ANYBLOB=',grou', @ANYRESDEC=0xee01, @ANYBLOB="2c616c6c6f775f6f746865722c6d61785f726561643d3078303030303030303030333030303030302c626c6b73697a653d30783030303030303030303030f69163c864a8a4286c6f775f6f746865722c64656661756c745f7065726d697373696f6e732c666f776e65723e", @ANYRESDEC, @ANYBLOB=',fowner=', @ANYRESDEC=0x0, @ANYBLOB=',subj_type=wlan1:,fowner>', @ANYRESDEC, @ANYBLOB=',seclabel,hash,\x00']) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)) getsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @initdev, @dev}, &(0x7f0000000080)=0xc) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000780)=ANY=[@ANYBLOB="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"], 0x20) sendmmsg(r0, &(0x7f00000092c0), 0x4ff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f000000ec40)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="3b3d2dffb8a0"}, 0x14) r2 = add_key$keyring(&(0x7f0000000100)='keyring\x00', &(0x7f0000000140)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffe) r3 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f00000000c0)={'syz', 0x0}, 0x0, 0x0, r2) add_key$keyring(&(0x7f0000000180)='keyring\x00', &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, r3) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000540)={0x0, 0x35, 0x18}, &(0x7f0000000680)={'enc=', 'raw', ' hash=', {'tgr160\x00'}}, &(0x7f0000000740)="c191d54428e32b413affbe0ce9549505cf224be679783ace910c52c9e720c8509e07c042e9697a46664c2b62961407273734c03633", &(0x7f0000000780)=""/24) add_key$keyring(&(0x7f00000003c0)='keyring\x00', &(0x7f0000000440)={'syz', 0x2}, 0x0, 0x0, 0x0) r4 = add_key(&(0x7f00000002c0)='.request_key_auth\x00', &(0x7f0000000300)={'syz', 0x3}, &(0x7f0000000440)="a3c4b798c02fa4cacc3fa39c078ae326a6d7f6e9c7ba302f0a6aaa2f6c5f08e6500bebbd6ee22c1b4fb7e3c7733478acd48c1fb42f365eb5039f4a771333f789a3fbdd39b5451a7df72b0ce7a80a37084d3511f764d480b5d5ce80afb0adf499f6235bc64562dbd73053f57b55b8494e17", 0x71, 0xfffffffffffffffe) add_key$keyring(&(0x7f0000000180)='keyring\x00', 0x0, 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, 0x0, 0x0, 0xfffffffffffffffb) 23:15:03 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) prlimit64(0x0, 0xe, &(0x7f0000000280)={0x9, 0x8d}, 0x0) r0 = getpid() sched_setattr(r0, &(0x7f0000000040)={0x30, 0x2, 0x0, 0x0, 0x5}, 0x0) r1 = socket$inet6(0xa, 0x2, 0x0) recvmmsg(r1, &(0x7f00000028c0)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$inet6_mreq(0xffffffffffffffff, 0x29, 0x15, 0x0, 0x0) fcntl$setpipe(r3, 0x407, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) write(r3, &(0x7f0000000340), 0x41395527) vmsplice(r2, &(0x7f0000000000)=[{&(0x7f0000000500), 0x3528a9c0}], 0x1, 0x0) sched_setattr(0x0, &(0x7f0000000080)={0x30, 0x2, 0x1, 0x0, 0x3}, 0x0) sched_setattr(0x0, 0x0, 0x0) socket$inet_udp(0x2, 0x2, 0x0) mkdir(0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="50010000100013070000000000000000fe800000000000000000000000000000ff02000000000000000000000000000100"/64, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="ff0200000000000000000000000000010000000032000000e00000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000060001200726663343130362867636d28616573292900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009800000060000000e59b133cc78cecc57debbcd162da13cd1a151400"], 0x150}}, 0x0) 23:15:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) preadv(r4, &(0x7f0000000000)=[{&(0x7f0000000100)=""/82, 0x52}], 0x1, 0x7dfc) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:03 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) sendfile(r4, r5, 0x0, 0x8800000) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r6, r6, 0x0, 0x8800000) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) write$binfmt_elf64(r0, &(0x7f0000000180)=ANY=[@ANYRES16=r7, @ANYPTR, @ANYRES16=r6], 0xc) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff}) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) r10 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r10, r10, 0x0, 0x8800000) sendfile(r9, r8, 0x0, 0x8802004) r11 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r11, r11, 0x0, 0x8800000) r12 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r12, r12, 0x0, 0x8800000) r13 = dup(r12) ioctl$PERF_EVENT_IOC_ENABLE(r13, 0x8912, 0x400200) lsetxattr$security_smack_transmute(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000140)='TRUE', 0x4, 0x3) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:03 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:03 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) [ 466.464492] netlink: 96 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:04 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = bpf$OBJ_GET_PROG(0x7, &(0x7f0000000100)={&(0x7f0000000000)='./file0\x00', 0x0, 0x8}, 0x10) ioctl$PERF_EVENT_IOC_SET_BPF(r5, 0x40042408, r6) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) write$selinux_user(0xffffffffffffffff, &(0x7f0000000240)={'system_u:object_r:public_content_rw_t:s0', 0x20, 'system_u\x00'}, 0x32) r7 = syz_open_dev$mice(&(0x7f0000000280)='/2\x8b>\xb2\xb4\bqht/mice\x00', 0x0, 0x10040) write$selinux_access(r7, &(0x7f0000000180)=ANY=[@ANYBLOB="73797374656d5f753a6f626a6563745f723a667361646d5f657865635f743a73de2073797374656d5f753a73797374656d5fef3a6b65726e656c5f743a73302030303030303030301b303030303030303137333500"], 0x55) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:04 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:04 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = accept4$inet(r1, 0x0, 0x0, 0x80800) r3 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r3, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r4 = socket(0x0, 0x0, 0x0) getsockname(r4, &(0x7f00000001c0)=@rc, 0x0) write(r4, &(0x7f00000001c0), 0x0) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) getsockopt$sock_cred(r2, 0x1, 0x11, &(0x7f00000004c0)={0x0}, &(0x7f0000000480)=0x8b21d7b36ca52682) r6 = syz_open_procfs(r5, &(0x7f0000000300)='coredump_filter\x00') ioctl$sock_inet_udp_SIOCOUTQ(r0, 0x5411, &(0x7f0000000500)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r7, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) socket$packet(0x11, 0x4003, 0x300) getsockopt$packet_buf(0xffffffffffffffff, 0x107, 0x0, &(0x7f0000000040)=""/8, &(0x7f0000000080)=0x8) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x50d, 0xa000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x100000, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x7e0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r8 = socket$packet(0x11, 0x0, 0x300) fsetxattr$security_smack_transmute(r1, &(0x7f0000000340)='security.SMACK64TRANSMUTE\x00', &(0x7f0000000380)='\x00\x00S\x00', 0x4, 0x0) socket$inet_tcp(0x2, 0x1, 0x0) clone(0xfd, 0x0, 0xfffffffffffffffe, &(0x7f0000000100), 0xffffffffffffffff) bind$inet6(r6, &(0x7f00000003c0)={0xa, 0x0, 0x0, @remote, 0x3}, 0x1c) setsockopt$sock_int(r8, 0x1, 0x23, &(0x7f0000f59ffc)=0x194, 0x4) r9 = socket$inet6(0xa, 0x4, 0x0) setsockopt$sock_int(r8, 0x1, 0xf, &(0x7f00000000c0)=0x6, 0x4) bind$inet6(r9, &(0x7f0000000040)={0xa, 0x4e20, 0x0, @ipv4={[], [], @dev}}, 0x1c) r10 = getpid() mknod$loop(&(0x7f0000000040)='./file0\x00', 0x6001, 0x1) creat(&(0x7f00000007c0)='./file0\x00', 0x800000000) unlink(&(0x7f0000000000)='./file0\x00') ptrace$setopts(0x4206, r10, 0x2, 0x100001) sendto$inet(r7, 0x0, 0x0, 0x20000802, &(0x7f0000000100)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0xa}}, 0x10) setsockopt$SO_BINDTODEVICE(r7, 0x1, 0x19, &(0x7f0000000000)='ip6_vti0\x00', 0x10) write$FUSE_CREATE_OPEN(r7, &(0x7f0000000140)={0xa0, 0x0, 0x1, {{0x0, 0x0, 0x0, 0x5, 0x0, 0x3, {0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1ff, 0xc18f}}, {0x0, 0x7}}}, 0xa0) sendto$inet(r7, &(0x7f0000d7cfcb), 0xffffffffffffffef, 0x0, 0x0, 0x0) 23:15:04 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) write$binfmt_elf64(r0, &(0x7f0000000480)=ANY=[@ANYBLOB="5ae01d2f93ebf97f3f1f1b5d26b9aeff53d91b7a4ebb2bdf5050d31011ebf6f9a50e8acb960b0f16d814534be62b77a465c79943ad723930e1e8809c619d2272f39a7a431be850000000000000ffff04aa87e3d1cfd8591e027d9b3e4e5602fd37c35cf03209bad000a06bb9788854d0aacc358857d5f5", @ANYRES32, @ANYRESHEX=r3, @ANYRES64=0x0], 0x56) write$binfmt_misc(r0, &(0x7f0000000180)=ANY=[@ANYRES16, @ANYRESDEC=r1], 0x16) r4 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/avc/cache_stats\x00', 0x0, 0x0) openat$cgroup_ro(r4, &(0x7f0000000300)='cpuset.effective_cpus\x00', 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$IP_VS_SO_SET_TIMEOUT(r6, 0x0, 0x48a, &(0x7f0000000280)={0x8001, 0x9, 0x80000000}, 0xc) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) syz_genetlink_get_family_id$net_dm(&(0x7f0000000140)='NET_DM\x00') r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) flistxattr(r8, &(0x7f00000001c0)=""/137, 0x89) ioctl$RNDGETENTCNT(r8, 0x80045200, &(0x7f0000000100)) openat$apparmor_task_exec(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/attr/exec\x00', 0x2, 0x0) r9 = dup(r5) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) setsockopt$sock_void(r11, 0x1, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:04 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, &(0x7f0000000100)={{{@in=@multicast2, @in, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@initdev}}, &(0x7f0000000240)=0xe8) r5 = getgid() fchownat(r3, &(0x7f0000000000)='./file0\x00', r4, r5, 0x800) 23:15:04 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:05 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = ioctl$NS_GET_PARENT(0xffffffffffffffff, 0xb702, 0x0) lseek(r1, 0x7, 0x4) writev(r0, &(0x7f0000fdbff8), 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) r3 = syz_open_procfs(r2, &(0x7f0000000000)='net/ip_tables_targets\x00') setsockopt$packet_int(r3, 0x107, 0xc, &(0x7f0000000040)=0x80000001, 0x4) 23:15:05 executing program 4: r0 = socket$inet6(0xa, 0x80002, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x400806e, &(0x7f00000000c0)={0xa, 0x4e24, 0x0, @dev}, 0x1c) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_mreq(r1, 0x29, 0x1b, &(0x7f0000000140)={@dev}, 0x14) sendto$inet6(r0, &(0x7f00000009c0)="c7cfcaaa22e10542fca5c0195350f15147657e0bfc59d383a47190db88690e6fedc3040ab5809ae02a54cd429cc3338c5afa0c9dce3f91950d1f567f358ac21154159130e88cbb6c43197813b2f23f3e442f80877490b393408142ebcfea6821f543e5ee9e27032e2b75d78f1b79f5a6bb6f0645e267770ef7e8f3a92148091217450ce8581e54223eeb6486205a209bf1fe854d211c03f8c3140fc3979d824082990d119473d20e94f253c9621fac339560ae46cb24b88bf2d01559bb658e343257b90f233b81bc5c398be3bbddb23a1e5d37149eb0f4a333726cf6d5b7647306559155f1c69d6bfd145b83576f2df4d85f271fd4119db923e2412c66dd954eb59dddc7e1fd286a83971b2ba1c63b4f99702cf91f3d1ecffb8ae189c79b403805e83650c251a564942896f205640c23b0cf51fe9bd931f54a343794710a9cd53cef20938edddb2bfa3c1f72f8e79e41e30fb8f9d314abd999ba396521b6c10bec7bc9d0745a80299342f5cf89eb9d94044258fbb18cec1cdbbc016a773d3ae41e3e30248e716fd0873d31454902cbe7dcf7d644dfadc255d99652b5ed5a5b1a75e3ad49cf80178678402e9d3a755d009889b2e6138f81dc02eedcc353aceb2f7781aea08aa91be7e1e2416ba3d555b1f2237f68c5d7dcfcb1b917c292a35d6d7e7cf2cb1dd6dba5a50ce55c4638d7d38cb7afd8da02f281ab69392bc6531eb03eb97c1d075e3342c244861d04bcad8991b8f588e48ad7fe218d2f5e604bb31c59241245b485210fe418af3d6377b59d5ab128497efeced38cc5036b1f34cb89674b5179219f34b9e8e1849695d7c23cce77eb8f038ef9f2cd69d1c9e2d6b46610adbadbdad857a77f59d38cb5120709716b87c52a48de249b231d7e39985b8b58094c0d7b4c6d1671a8ff9d2daaca94df2adcff6420077df0ddbc66d00b141ffc6e28bed09a19056e52a905a72c99a04af56b22da83135808ba2bfe87a39753447e78500d16bdad52d97df73d4852a79e7ec6910701b712cfd58c62b3ade86cf6ff0cd78719fa1ae81640381cb33f4f6b03c913e820cf9eb9b5cf7df9c878596c9ac9444cad118673fe339b4b7287b310ecff4742bfea2612d79d418293f0dfe14bc819c466473438ad71ea3b1386d17a9038b1f5a9285481500f84f4c7eabbf2eb071a101c69cce8e7495bda4c28a4e88f6a258abf58579c290eeb742b2678daab3ecc8c2bf97d89e89472901e254dd63ca7d918f8a7523161e29b28f64b285da7bb4a17d0ad734c321623e246bb0b5aaa08e8e7ac42b74ba83c70a8ca80068400be6adc3f4b01ba1050b54e6e4cf72fb567fbd27b74b2bfa7b7cabc6938851c13c6df7d5aaca79afd89b5e925379b959c7929ddfa3399695343f435772d70e5cfa3550377d23f50011ad5657e94c464cd43eb85496fd3b03bcb2d9278ceb432194d9893ffa747dfe85309f256c910e31e81dcd3cd8a13744fc2874737a2ff34bf8c89f15da7cc0853434117d744e30360b38ef1a063f9ee506f048e9980054e6c5c5688d04ece6067ac55bccc9a7773a2c4e21c039d153622130faff9fd675d64ad7284bd011b9b224713a721b4b731cf342357642a1a0bb846f5be443b7e72e9825b5f3a078c6ae09e4512dd93a5be1af13a49e6a33938509d3557aecf2356ac2329871b662a99cf3fd2486b064e7e6f90c1f8d632186a8bda338b02d45da4ea9041d42a23f40b93346dddc473a9f1a3d9f0285b7e48cbb87bc34d44b090a5e2aaf4764a10a44168f1719eff0b0d9bc1ce07750af4c21d0c67eae0799e91328c8b14869e4edd255a41735a2b1818aa9d3b271ba757af010ae6dbad89aa0d8f5b6f8ef3917adcedf247ffcf9ade407dfb5094", 0x534, 0xc001, 0x0, 0x0) setsockopt$inet6_mreq(r0, 0x29, 0x1b, &(0x7f0000000300)={@remote}, 0x14) sendto$inet6(r0, &(0x7f0000000240)="3ce95c98b66a9cdea42aca63276ef1eca3f038047504ba09072b9792bbe041c012d015e0f9cdf7aa7a4d18766deff9a2735edc11437a10c0e9f265c48e7033f01161d568aac8b3738b4c3df116d964712d2c577d1181a2a242ab4ada0b6cd45c1f36c27a7453575b33cdd7300a74dd585eab465795dccddd26", 0x79, 0x400c000, 0x0, 0xfffffffffffffe97) setsockopt$inet6_mtu(r0, 0x29, 0x17, &(0x7f0000000140)=0x4, 0x4) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = dup(r2) ioctl$sock_TIOCINQ(r3, 0x541b, &(0x7f0000000040)) setsockopt$inet6_udp_int(r0, 0x11, 0x1, &(0x7f0000000000), 0x4) 23:15:05 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$EVIOCSABS20(r5, 0x401845e0, &(0x7f0000000140)={0x1f, 0x81, 0x0, 0x0, 0x3, 0x3e}) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r6 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_REPAIR_WINDOW(r6, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000100)=0x14) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:05 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) r2 = ioctl$TIOCGPTPEER(0xffffffffffffffff, 0x5441, 0x0) ioctl$KDSKBLED(r2, 0x4b65, 0x6) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) fsetxattr$security_evm(r3, &(0x7f0000000000)='security.evm\x00', &(0x7f0000000100)=@sha1={0x1, "b4103876014c89db7df2deaf898ef137262743b0"}, 0x15, 0x4) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:05 executing program 4: syz_mount_image$msdos(&(0x7f00000000c0)='msdos\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@fat=@fmask={'fmask'}}]}) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000180)='/dev/fuse\x00', 0x2, 0x0) r1 = socket$nl_route(0x10, 0x3, 0x0) r2 = socket(0x11, 0x800000003, 0x0) bind(r2, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r2, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r3, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r3, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r4 = bpf$MAP_CREATE(0x0, &(0x7f0000000480)={0x0, 0x3, 0xe33, 0x1, 0x52, 0x1, 0x8001, [], r3, 0xffffffffffffffff, 0x5, 0x4}, 0x3c) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000400)=r4, 0x4) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r0, 0xc0406619, &(0x7f0000000300)={{0x5, 0x0, @reserved="525987042e84e030a272ccbaad4dc56c3e27f70101000100570d073cad54622b"}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) write$P9_RREAD(r6, &(0x7f0000000380)={0x69, 0x75, 0x1, {0x5e, "c154d31810b028202b154c2ce93ebbf51a7144e0a5d34bf7d43d96d2a345e35f474030d2e7ac9cd258296f78abec1217687d62fecc96f35ff0f2a48ae889552046d802fbbb14d0fffa1b0fff9d6ea43e5217199890135e44888da612f4a1"}}, 0x69) timer_create(0xd4583420e3930a2f, &(0x7f0000000000)={0x0, 0xc, 0x7, @thr={&(0x7f0000000200)="0663b5a87746aa22441cf5dbd81ac8065729e70bbcbe3c348593ac95db7ccbf2475709ebb4c1900c1e86f06c92a3809b5f52c7247a9baaefb9520394275f8b29d4d93b955a06a22233706dbf2fa4150d303f569337609aa9f01df657e28a9021b7a353ac83dc53e899193d9c09de3992f9f675787bcdd73bbe319004f07ef9f5a129aa98aa93641a2ac474a1c61cfeb979245c14643aff1cc4c28e6dc4220ff14c71b3f3d6630e365b25395aa4a88678c00693c49f5ceaac67634cea476c25c2f36cb2da51c9fea2e3182329ecb7903d2a4a5399de52d10dc71b61597b4e4cfe3c7506e5acd481d45ce7a9de6ba0", &(0x7f0000000100)="2a1689adb924b0dcb9a45d43db673b23a641d11aae4a9fdaffdbe5c5fa38a3a6cba621a37a80919313c206f8f1c374ccce9cb035666e508f01c66ff73fa12c62469d64183d2c4d272650eb6cbb50193d61387a872bb7406286ddf4b4079979b3fbfb9aefed2ae5ee46f1"}}, &(0x7f0000000080)=0x0) timer_delete(r7) [ 468.354942] FAT-fs (loop4): bogus number of reserved sectors [ 468.386132] FAT-fs (loop4): Can't find a valid FAT filesystem [ 468.509794] FAT-fs (loop4): bogus number of reserved sectors [ 468.517188] FAT-fs (loop4): Can't find a valid FAT filesystem 23:15:10 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:10 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:10 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) r2 = dup2(r1, r0) r3 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_GET_BEARER_NAMES(r2, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, r3, 0x100, 0x70bd28, 0x25dfdbff, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000}, 0x0) 23:15:10 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) r0 = socket(0x100000000018, 0x0, 0x4) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) setsockopt$netlink_NETLINK_PKTINFO(r0, 0x10e, 0x3, &(0x7f0000000180)=0x4, 0x4) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) timer_create(0x0, &(0x7f0000000000)={0x0, 0x18, 0x7e4dbb902d64f442, @tid=0xffffffffffffffff}, &(0x7f0000000100)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) ioctl$TCSBRK(r6, 0x5409, 0x81) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) openat(r5, &(0x7f0000000140)='./file0\x00', 0x100, 0x40) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) eventfd(0xe8) 23:15:10 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) getsockname$unix(0xffffffffffffffff, &(0x7f0000000100)=@abs, &(0x7f0000000000)=0x6e) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 23:15:10 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet(0xffffffffffffffff, 0x0, 0x0, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000000700)=ANY=[]) pipe(&(0x7f00000006c0)) write$UHID_CREATE2(0xffffffffffffffff, &(0x7f0000000400)=ANY=[@ANYBLOB], 0x1) write$FUSE_INTERRUPT(0xffffffffffffffff, 0x0, 0x0) socket$inet(0x2, 0x0, 0x0) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}, {0x0, 0x989680}}, 0x0) r0 = eventfd2(0x81, 0x0) ftruncate(r0, 0x2) r1 = eventfd2(0x0, 0x0) write$eventfd(r1, &(0x7f0000000100), 0xf58c0472) r2 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r2, &(0x7f0000000100)={0xa, 0x0, 0x0, @mcast2, 0x5}, 0x1c) setsockopt$inet6_mtu(r2, 0x29, 0x17, &(0x7f0000000180)=0x4, 0x4) sendmmsg(r2, &(0x7f00000092c0), 0x4ff, 0x0) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) openat$uinput(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uinput\x00', 0x2, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd'}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) ioctl$RTC_EPOCH_READ(0xffffffffffffffff, 0x8008700d, &(0x7f0000000080)) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x408e8, &(0x7f0000000040)=ANY=[]) mount$fuseblk(0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(0x0, 0x0) pipe2(&(0x7f0000000340), 0x0) write$P9_RXATTRCREATE(r1, 0x0, 0x0) 23:15:10 executing program 4: read(0xffffffffffffffff, 0x0, 0x600) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000)='/dev/ptmx\x00', 0x0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x3f) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000080)=0x2) read(r0, 0x0, 0x0) read(r0, 0x0, 0x653) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) mmap$binder(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1, 0x11, r2, 0x3) [ 473.435053] serio: Serial port ptm1 23:15:11 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) write$binfmt_elf64(r0, &(0x7f0000001040)=ANY=[@ANYRES64=r0, @ANYRESDEC=r2, @ANYRESOCT=0x0, @ANYBLOB="ea34fb68682bb831021d0faeffab3827989d24264367a561209dae0e75560b802917e250e082d542912cecb2ad6f77cbfd871ca657772664266c9646c149665d80df22a6a387e9baa5faac1a9632bdcce17ca20186448b5f4252e49bccd09d8ccbe357fcac012c4bd2780fb05cba38c0e9c75a4d2be82efa4f1093aab9270232571b0f79bbb9a6fe1f5da211875f851ee0f1d144045d7658bd49186adf9d2c195ba757964d8f575948afa0b59cc11b55b1cb055d93983ea80342af059eaf15136bdfbe829074d129e256b9bfe21ef620de86d7ed2653dc204e12c49cf4417bea0633a7692f99fd554af11ae5fa5d6da31aadfd5c1ff3e4ac24e91755f359ac681eb62de30b59740b29e543b4434025a26c11813979188c8a3bcf612951a74cff41653933e1704884000388743e3877b599a7593ab842c71837bf48ba797c15f881eb222800c272b5c6aec7f46f544b1e383b039a1df4ba10d264bafce90e9c689f6e05b3b05dc0006ff0d2ed1b3ac0bfd94bad125c736c03ddad53abc31e91a5b920e412ab97b4891983d56b26349f80d6b19179fff2c9b27f10f6a61eadf42bada5184b3e0629b6197b0205868f5e75dcc34cd51ef901a00628a282e63a0382a277ecf2e559acd89cdb97aa645275b39e9739533b5fde9daf2e896ca0445b777dc5d0b10ca20bde0de7d01f3b61759de9fce014de85e9594e13b42dfdbe79de6763ae3e11e7015b87b98443ac8693ba7ea5365b53443a65774ad7d783f19c7ab79795708905364d5030fa6d211b4e59f69a15628d4ebdeaae6bbbc22885aee97d4b0fd17aa4deecd6aed357d01ce494b9c034cb3e5fe6eb3999628aacadf6355333a36cc6d626bd2ee113baa722353506c394481b56bfe09d1dfe474426bae9d6bc9c8d9431b5fd2fca60001a3be98f2cd6c73c89d1fcdaf5b0ca97b48d921f5ff8573400e9ad6fad2b2a8cd9db79d6a750a69f90ca656b08fd17cfd6241b2a5834c0f8d74a44d31916d9ff3c1ffaed4afdc518da1453fce9308650d26784cccead10f40ce25dfdfb524011cc26633b694f0ad50e83fbc8272652b0bd677ad14441922da435de3208eec951ef18142aaa6cc142d64f8f049e37be22f3c299ff993c27c7cf256e1cbb3009b9f579117b008e84bcc46526856015ccefae9c06548c9d0445fc8ba407dcc950b51f9529c8967aa72fc55f5102d5ee03c6b07d85024be6a44025b26a10d07d4da6cbd14f6347d46d1c845261618c900b6462f421769b3ff776b964dac0e426923d7fbbdc539130f654cf5c4aecbc7884da7d30336a7b4fffc7fefc87c389bda53aeb00abca5b63937529bbfa7fd36727149a76441844ac0357fc50cbd55bdaeb320997e3f57505471d6b434d22816cc19c1ecdc4b40d2e0f70b08f9d6c7fbf9bac8571e75b7e5f2710e7d695dc0df1f95ebec15111e1829a48db383914442a2bd83f1cdc57949017b026a5d6e55bab71af8bf39bb7a2965fa69b82282ce036e1227568753896d3906326aec31d4b459caafe51f18f41d13f915ecf43336c303507512439f0506cb2e2cae6e4f21a90f74e749974902b45b9b816c6bbd8bb5932b04d433703a88241f7845f18e25aa854d098674b06fadd45f621bba0b29187fd2c7fb04d1811b0a284c4764e892b9fe9bbc22da55a9ea10171f9ad48219b90cf55f661c4ed2baf1b3e26e5e7c05cec4751e7e235fffefecf5a4c4f782860e621cf36d0ab4adbd9f51eadbc3069f35a223059c381bab11192db4f20417dede26ddcd7085cf18ad56a9842ac69931c49564f3a17914754d69428fa94454208387ed23a3797f96188212a1341a442125bf902fd5b46348c5589eefa6b79effb34abadcf86e0e5b468af39bbee7f125d6687b38afa3443e5a7c79d4684acbe708c5669d0618d5ade4ba64e1459986b5abee0f26fcbf57d32e3995718a919ede1e3e1e66689c31efced878f08a6cb590f7a7c2572e643d140d049111cf27cd41264614a4aaae34c957f990a5b474000c75e76abc98605d9b515f59e0f687d2a527c550850ebf63bd446d0c6d04bb01e109e5680d27c6410d4cfef40f191f5b83eaa92132237457dd36b1b54adaeb105b96b4a83c35846468ad24fae82887c148f8697a2ec361712eaa8666138990dfef671bceb0c0b73d7408a9c6995ca6ff350c1844150e5e1ecaae74cbee4f51318aa304c19487e50dba664df1e7ade16001dfd8e0299e150bb3ad372f531488dfb5cbcd1ca7a933bee14c3d95fc8585bfed1f8120c247155b2a30db7ae73db60bab069ea152a22726edd799382874e6edd958697200e4b238a0e4993c0fcee8e749852936dda024066b55b94221230d3ab90f19df28ee71ed9a4d03370bfdf0fc81aaf0e609b3b3a241ed510f7d99e7bac31fd66c7d00276564668f8c085f45b98bb49cacaa2c57c21818dfee78d8b246b77424ea3c30a800d9316c673a00a735060927a2b7a6e3e3f5a19613c0f4d60438cb698ca34117057f72d571324d112a8b479415ad09190b6b3ec19600f81baa88ec5c7b34dd1f89e875bc8c34e7d8bccdf97136b2386e4dfea7a42980e5c1e74ffcbff83e9f4c92cb49b838cdbab470a5a3f2de7c61a9c02cdccafc11672c67addca98a8d2d784c5c37f5c1b0c32eb784828484c24b6b9a9893836b242b81d69f22e3b244dc11bd3f6ffa3a6c32b9180398e88947b5580b0df98378e2b76de89a944ff62f4bbe8f5ce64954f119143301118a427ecc22b04806c6d79f46c9e80547118dfc12896196fc4232551720ad66b12efd593c580a839dfbf10699ee13c7c9d30315365e4780f081d068d58e534e6f468c18a07dbc0dddd27e3661dde86b4c2ddc5d55ebbd3bef323bc844f4e28a20361615039ea266deccc677ca2fb64240a819245c6cd64fc84b3eaabbf9fca47e4459a30b2e1cc6d779cba544435c97671aa36a26903b84b06cfef47bf62d7e04a4fc3db2f3a54ff034a061557c0d790f2e11a1dde2d86ab332ee85b2470bcec9ab5a4b445afc55060e8f1e67c253b3acc69983205a26491d5f61aa756d0c8993e4884a39d9dc238d61d1e85da2cae7ec7912276cc11ba84528d69d7b8713a457b0e7af52faafcb8a7c45ea76c9015292425c9994275cf12381ae05555264ee93e864301349773920346ab73c04f9f5c0232fe21b74f8ff2cc9fbcfff7127a8f0f0a0b3394cc99d4a32a2f376103762583e6f6a9a9e08091114de7c275e5f935c22278000f82d9a8cfebfd5b00fc802508cb3164c790308f65ac515bd73bb6aeefd42457c2e84ef2fa6b4075d02b170d968809a4b0bf74e234eb3cc4c894965cf19d25a4e0a95dd2ac43de3da703ee8d781484d44c87318156176fd727007550d14cb1abad94e073c5943d6916cdfe82b34e0375ace337201923376f714804d34d378d1e17e58dded36e0477c5cad09498c131786cc9525dbb63f9cacce487eeacaf583c12cede863314a4db9d334f04de23e0527af56d7b15c3d09093e4d83d7171497f52ebfe0748ea5d9973be187d2563d3041d078e7236aa0ad70440892ee597ad54a1672f272a5bca32dd81bcbe8f72ffc61b899bfe6af23cc17b91158ecaaad3b9d4ae61ecfe8b425361f6396a4ea1e4a19628f29eccf43c7065d7679215de5ef7e470c9104e7516ef3d14b753df2028893b3af7561001f9995a04110b7657131080709c520a175159a34e485939b6728460b46751f669c72e8cd0a5f2efda65bebe73f41e4ebe9312d38c247fd26392787812906526af40fd08e114e3c84d7eb5577950afbdd3787ca53bbf767e83daf722d03093adc3b5c4d99daa1ae35b9d61b3c1c955a8c278508aa3747acfc6cd3669997912b51c6fc84c5a1feab982d826023f45ce6407a94db6cf1ea4a70aa34f22b67dd4fe6292b46a3b5857c6aa0771a2e03f6490552fe403b3be50bf070e7a655beb82b5933283a417c737cd0a682e70184143c3c89aa85190ba39b39343152ea4c09907dfe0987ab0df78f091a318380abbf6e47768fcbf05336ac414ff1647736296b00a750e02b7a4c75eea53bc56d50f9b8140385a9cd12a94f26c00bcf10101ada0f2dac73e9c840b7cb1b68207395d373cf3c4c82b0cf5aebd213e2d4eef025acb9f1a6b4d893b1354f6bb5460c6058bd0672410281feeab6cd2f22e74cc5c859af99740103b97b013a428bba07fa2ddd68c015dc7c72a232e682feae9e5421f6d179a9f5000f445c681717bca4a0d3ea6f28585954bdcd338bdf884093a605ef29c761b95bba26bdc3528bb34b095504202d9587e3acff019f722743bf43efbc7891ffcc98ba16b001744204843e21f96596ecfb7f41ba55bae5ce224de93570793592e8d29cd2caafd1396002dab088465795357932d05dcc496c120c67cf1a1ef4e6d3d493318027268a17d779b8cf27b3c528fbe7633395db06f45f2d47a8ebd01b3ecb15ff43fc525d56a53ed0039e2463bbd7806d2ad60534daafad8292b79632a9f939e0b8d1b18239d180050cfe18e578004dd1a347c80f68f571d158cca007f153a2b64027fe3739f111e679ceb533b8f5995d0678628887008d199469ebb8d2d6db919fd9426ee5dde0390de01296d2c757fc6a959f9ea8e5ab034eee6ef8e66aa2ea521b7724ffe5ae91d326b181b56553221efb72c4a8b65444214f8c7b2f52954b34cb759d535044ae6be3fdaaaa03d057131ce4dadbac255973c0521bb29d7dfd52833d45f2269acf85eb1e110fdabce74364e4c364d7d01a96b1619e38fafebf4afe33539a2602a0d46d1d45220fc99f22010eccdfc69f9501f24ffe16956f6433da18c21878735974328665344a7eb138783da547a2becf5e0197ac0ec9df0f76451798b5766f0bca19476232fd3fd631f8c32609700afb05b45ef910e24cc3c058838d6cc9ff29f56c5259d503fcf1dd1033bd474a1bfbe5977b392d7136411821e082fc2cd3f0e8c0b67e799221b773b3cc175de6038ce30f86c77f76789d3bc64ae59b193e6809b13f618ae55559a7714e5e71b5bdf8317caab2957ed0545c51773ccca2e431bcf15558e7a1f4c831b7ca142bb7824b7fd58df2baa9483ccf3a34918f8c701fc8ac18ab70606ab189220b8de9982c89f94d4cc76cba017aba95f0981e6e2ce44ac446e981d5e9f04ebd257712de05cf29766cd9dddc2679a0a64303511df898fa98ef4b6d685fc51f29a83b0ff1bde3c2b9c57f37d11d396109b1adb812534715a596dd15319a2ccbbfa139a51d45791acf001b46c62ec00d5882eafd7328da12b98977e508458059ab5f77dc8a019805d5879114fb0330ee3f7d9a62862a1f8a19fb3700adee51171d56bb3299af76b87f036077a382ea893545f5f8ddeb108b0bf50ec7cd581bd4f3c5b3eb1cea9724b9c920c52d9ba58195b8785f83ac27c6f6a053b82ecbe6ccceda0e3d49cc88aba8ba282fc34394a17426bff20bf0902b827c50ca02a5a2c26ed8dd773a8fbf0e27a50f16134accccf0570b73982a0fb0aadf022ccfdc10762d5aa95e72b25e33c73f763c27111ecbb44a88d7678c61a3271106ddae33399685812ebf86676c594ca4a1d8db55b2485c7f9a51aac143ced0cad549f4b8609e45dd1675983cf9f88743dfc803e0d52b0f134b5fa7ce29e63804322b006550c10c2552b19d082adc52a7901d546c896a626d77f04fe375da9c4abbdb83ac4bb92bd4b53d1145782111c5f9f0dfad54a63eb61c3191a5799fffe1365db789b4e35c5b4f75f3c8f0c4d9f505e1148118645871327dea36e", @ANYRESOCT, @ANYRESOCT=r2, @ANYPTR, @ANYRESHEX, @ANYRESDEC, @ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR64=&(0x7f0000000100)=ANY=[@ANYBLOB="3ca518ab7486d9b7495f598d39fb259ebc732afd1791d4463e6b59299703d992fe46b6cf23e0b5ec8c121805b7c5b6d64710d143871ed5a174c42a46f4f8920271830ef42d685d8763059a30c472129dbb025eaf263cb1700bb2fa6301871f81502438cdee453da69328e24ba911ba8379f5", @ANYPTR64, @ANYRES16=r2, @ANYPTR, @ANYRESDEC=r3, @ANYRESOCT=r0], @ANYRES16, @ANYRES16, @ANYRESDEC, @ANYRES32]], 0xffffffffffffff12) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:11 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r1, 0x8, r2) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:15:11 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/net/pfkey\x00', 0x200242, 0x0) mmap(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x98a8cc3935042ad1, 0xcc8683fff00eeede, 0xffffffffffffffff, 0x6ab66000) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) fchmod(r0, 0x0) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getsockopt$SO_COOKIE(r4, 0x1, 0x39, &(0x7f0000000140), &(0x7f0000000180)=0x8) ioctl$KDMKTONE(r6, 0x4b30, 0xb56) times(&(0x7f0000000100)) r7 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r7, 0x6, 0xa, &(0x7f0000000080)=0xfd1, 0x4) bind$inet(r7, &(0x7f0000001440)={0x2, 0x4e23, @multicast2}, 0x10) sendto$inet(r7, 0x0, 0x0, 0x2200cf7d, &(0x7f0000e68000)={0x2, 0x4e23}, 0x10) setsockopt$sock_int(r7, 0x1, 0x8, &(0x7f0000000000)=0x713, 0x4) write$binfmt_elf64(r7, &(0x7f0000000100)=ANY=[@ANYRES32, @ANYRES16=0x0], 0xff5a) recvmsg(r7, &(0x7f0000000140)={0x0, 0x0, &(0x7f00000015c0)=[{&(0x7f0000000400)=""/4096, 0x1fa0}], 0x1, 0x0, 0xff96ce4aaaa47475}, 0x100) prctl$PR_SET_NO_NEW_PRIVS(0x26, 0x1) [ 474.229027] serio: Serial port ptm0 23:15:11 executing program 4: write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000340)=ANY=[@ANYBLOB="4611fc52af6ef71d37fcfc064a00c4720af2928ba29e4c2a0cd4229bffafbf930a2ab7e7dddcdbdd62426a7ddd8e97c9cc6d22ad7a49f755ed69eafa1180a3165a4a2895dcc6e17640e0738cebd3f5e56b6440d5ad2ece5a0434bf559ca95ba6bf7cdfc64d6a1ae311e9ed1a1d9d8873b3831a1d5f3dfe963308e24002214f64c342ef7778bc2546a8c0beabc539606e7b17d9bbfc32000517d724f7c84478253eab5e000000000000000000000ca076ab1461f7834e1ae17bc50000000000003fc3883b4c313d128eb290"], 0x41) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(0xffffffffffffffff, 0x29, 0x20, 0x0, 0x0) getsockname$inet(r0, &(0x7f0000000240)={0x2, 0x0, @local}, &(0x7f0000000280)=0x10) r2 = creat(&(0x7f0000000000)='./bus\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x6000) io_setup(0x1000, &(0x7f00000001c0)=0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000100)={0x0, 0x0, 0x0, 0xe0b7}) io_submit(r3, 0x1, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000), 0x10000}]) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$setsig(r1, 0xa, 0x18) dup3(r4, 0xffffffffffffffff, 0x0) ioctl$UI_SET_PROPBIT(r4, 0x4004556e, 0x7) socket$inet6(0xa, 0x2, 0x0) r5 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x2502) pwritev(0xffffffffffffffff, &(0x7f0000000180)=[{&(0x7f0000000140)='!', 0x1}], 0x1, 0x0) sendfile(r5, r5, 0x0, 0x24000000) r6 = openat$zero(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/zero\x00', 0x402002, 0x0) ioctl$UI_GET_SYSNAME(r6, 0x8040552c, &(0x7f0000000300)) pipe(&(0x7f0000000000)) 23:15:11 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) r0 = socket(0x100000000018, 0x0, 0x4) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) connect$inet(r0, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x29}}, 0x10) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(0xffffffffffffffff) ioctl$SNDRV_TIMER_IOCTL_GINFO(r3, 0xc0f85403, &(0x7f0000000100)={{0xffffffffffffffff, 0x1, 0x4, 0x2, 0x3}, 0x7, 0x2000, 'id0\x00', 'timer0\x00', 0x0, 0x8, 0x81, 0x8, 0x10001}) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) fchdir(r4) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) ioctl$EXT4_IOC_ALLOC_DA_BLKS(r5, 0x660c) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000300)={0xffffffffffffffff}) fcntl$getflags(r6, 0x408) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r9 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000240)='TIPCv2\x00') sendmsg$TIPC_NL_NAME_TABLE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x7b747455764f304}, 0xc, &(0x7f0000000280)={&(0x7f0000000580)={0x20c, r9, 0x0, 0x70bd29, 0x25dfdbff, {}, [@TIPC_NLA_NET={0x44, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x90c}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x6}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0xff}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x6}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x2}, @TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x8}]}, @TIPC_NLA_MON={0x24, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x1}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1ff}]}, @TIPC_NLA_BEARER={0x170, 0x1, [@TIPC_NLA_BEARER_UDP_OPTS={0x44, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0xca, @remote, 0x400}}, {0x20, 0x2, @in6={0xa, 0x4e21, 0x4, @mcast1, 0x3}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x20, 0x1, @in6={0xa, 0x4e21, 0x1ff, @initdev={0xfe, 0x88, [], 0x0, 0x0}, 0x9}}, {0x14, 0x2, @in={0x2, 0x4e21, @dev={0xac, 0x14, 0x14, 0x10}}}}}, @TIPC_NLA_BEARER_UDP_OPTS={0x38, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @loopback}}, {0x20, 0x2, @in6={0xa, 0x4e23, 0x8000, @mcast1, 0x4}}}}, @TIPC_NLA_BEARER_DOMAIN={0x8, 0x3, 0x4d2}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz1\x00'}, @TIPC_NLA_BEARER_UDP_OPTS={0x2c, 0x4, {{0x14, 0x1, @in={0x2, 0x4e20, @multicast1}}, {0x14, 0x2, @in={0x2, 0x4e21, @rand_addr=0x687}}}}, @TIPC_NLA_BEARER_PROP={0xc, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x100}]}, @TIPC_NLA_BEARER_NAME={0x10, 0x1, @udp='udp:syz0\x00'}, @TIPC_NLA_BEARER_PROP={0x14, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x2}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x80000000}]}, @TIPC_NLA_BEARER_PROP={0x44, 0x2, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x10001}, @TIPC_NLA_PROP_TOL={0x8}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1000}, @TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x12}, @TIPC_NLA_PROP_WIN={0x8, 0x3, 0x7fffffff}, @TIPC_NLA_PROP_MTU={0x8, 0x4, 0x4}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x1ff}, @TIPC_NLA_PROP_WIN={0x8}]}]}, @TIPC_NLA_MEDIA={0x14, 0x5, [@TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'eth\x00'}, @TIPC_NLA_MEDIA_NAME={0x8, 0x1, 'udp\x00'}]}]}, 0x20c}, 0x1, 0x0, 0x0, 0x40000000}, 0x2d6cc327ef9e102a) 23:15:12 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:12 executing program 4: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) socketpair(0x11, 0x1, 0xff, &(0x7f0000000080)) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) 23:15:12 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0xffffffffffffff8f) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open$dir(&(0x7f0000000140)='./file0\x00', 0x500, 0x0) sendfile(r3, r3, 0x0, 0x8800000) write$binfmt_aout(r3, &(0x7f0000000580)={{0x2da, 0x2, 0x5, 0x18, 0x26d, 0x5, 0x3ab, 0x9}, "6c5636744e9cec2bd344361b5b911e1b9bac9098fbe35749757dedbcb5106ed386d2aee288fe38e08ee55dec60", [[], [], []]}, 0x34d) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:12 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r1, 0x8, r2) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:15:12 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000280)={0x1, 0xffffffc1, 0x3, 0x9, 0x14, 0x4, 0x4, 0x70, 0x3ff, 0x1ff, 0x400, 0x10001}) socketpair(0x1, 0x1004, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140)='IPVS\x00') sendmsg$IPVS_CMD_GET_CONFIG(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x11020101}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x28, r3, 0x100, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0xf6fa}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, [@IPVS_DEST_ATTR_L_THRESH={0x8, 0x6, 0xea3}]}]}, 0x28}, 0x1, 0x0, 0x0, 0x4000048}, 0x4000) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r4, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r6) recvfrom(r5, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 475.946375] : renamed from ip_vti0 23:15:14 executing program 0: pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = dup2(r2, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write(r1, &(0x7f0000000340)="460000002800070f3200000800367700fbff020002", 0x15) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000140)=@v3={0x3000000, [{0xffffffff, 0x4}]}, 0x18, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) write$binfmt_misc(r1, &(0x7f0000000140)=ANY=[], 0x4240a2a0) splice(r0, 0x0, r4, 0x0, 0x4ffe0, 0x0) 23:15:14 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x130) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1f) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x8001}, {0xffffffffffffffff, 0x46b83a7ed3fe2741}], 0x2, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)={0x2}, 0x8) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4, 0xf, 0x6, 0xff, 0x0, 0xab}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xb, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x4c2) socket$packet(0x11, 0x2, 0x300) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 23:15:14 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDSKBMETA(r5, 0x4b63, &(0x7f0000000100)=0x4) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) ioctl$EXT4_IOC_MOVE_EXT(r7, 0xc028660f, 0x0) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000000), &(0x7f0000000140)=0x30) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:14 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) write$binfmt_aout(0xffffffffffffffff, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(0xffffffffffffffff, 0x40045431, &(0x7f00003b9fdc)) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r1, 0x8, r2) r3 = syz_open_pts(0xffffffffffffffff, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(0xffffffffffffffff, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:15:14 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:14 executing program 4: socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000280)=@pppol2tpv3={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @broadcast}}}, &(0x7f0000000300)=0x80) socketpair(0x11, 0x1, 0xff, &(0x7f0000000080)) getsockname(r0, 0x0, 0x0) pipe(0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, 0x0, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, &(0x7f0000000040), 0x4) connect$inet6(r2, &(0x7f0000000000), 0x1c) r3 = fcntl$dupfd(r2, 0x0, r2) setsockopt$inet_opts(r3, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb", 0x27) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x2, 0x0, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) r5 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000180)='memory.current\x00', 0x0, 0x0) ioctl$TIOCSPTLCK(r5, 0x40045431, &(0x7f0000000100)=0x1) [ 477.648467] netlink: 34 bytes leftover after parsing attributes in process `syz-executor.0'. [ 477.658259] selinux_nlmsg_perm: 70 callbacks suppressed [ 477.658268] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.735497] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.765129] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.806170] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.837206] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.866861] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.898178] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.928040] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.957730] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 [ 477.988652] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pig=25982 comm=syz-executor.0 23:15:15 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = gettid() prlimit64(r3, 0x9, 0x0, 0x0) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:15 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:15 executing program 0: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) r1 = creat(&(0x7f0000000540)='./file0\x00', 0x0) write$P9_RAUTH(r0, &(0x7f0000000040)={0x14}, 0x66) fallocate(r1, 0x11, 0x0, 0x7ff800000) fallocate(r0, 0x20, 0x0, 0x7ff800000) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = fcntl$dupfd(r3, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) ioctl$FITRIM(r5, 0xc0185879, &(0x7f0000000080)={0xffff, 0xa7, 0x5}) fallocate(r0, 0x8, 0x0, 0x8000) 23:15:15 executing program 5: r0 = socket(0x100000000018, 0x0, 0x4) connect(r0, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='htcp\x00', 0x5) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) write$binfmt_elf64(r1, &(0x7f00000001c0)=ANY=[@ANYBLOB="ba63c25f5ba4751f3f5c07175bf49a96edc7949965f8d1256a998e5d55172eac58dd0feb4bca622d9cb40135810949575b02b2481117cc6a71ed7f4fbe96025b", @ANYRESDEC=r4, @ANYPTR64=&(0x7f0000000100)=ANY=[]], 0x5c) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) getdents64(r4, &(0x7f0000000240)=""/236, 0xec) 23:15:16 executing program 0: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = open(&(0x7f0000000000)='./file0\x00', 0x101000, 0x130) ioctl$ASHMEM_SET_SIZE(r0, 0x40087703, 0x1f) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0}, 0x0) ppoll(&(0x7f0000000080)=[{0xffffffffffffffff, 0x8001}, {0xffffffffffffffff, 0x46b83a7ed3fe2741}], 0x2, &(0x7f0000000100)={0x0, 0x1c9c380}, &(0x7f0000000140)={0x2}, 0x8) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x4, 0xf, 0x6, 0xff, 0x0, 0xab}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xb, 0x0, 0x0) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000240)='cpuacct.usage_percpu_sys\x00', 0x0, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x4c2) socket$packet(0x11, 0x2, 0x300) openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) 23:15:16 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r4 = open(0x0, 0x250800, 0x0) r5 = open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r6, r6, 0x0, 0x8800000) r7 = syz_genetlink_get_family_id$team(&(0x7f0000000140)='team\x00') r8 = socket$nl_route(0x10, 0x3, 0x0) r9 = socket(0x11, 0x800000003, 0x0) bind(r9, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r9, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r8, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r10, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r10, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r11 = socket$nl_route(0x10, 0x3, 0x0) r12 = socket(0x11, 0x800000003, 0x0) bind(r12, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r12, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r11, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r13, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r13, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r14 = socket$inet(0x2, 0x1, 0x0) bind$inet(r14, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r14, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r15 = socket(0x100000000018, 0x0, 0x4) dup3(r14, r15, 0x0) getsockopt$inet_pktinfo(r15, 0x0, 0x8, &(0x7f0000000180)={0x0, @local, @remote}, &(0x7f00000001c0)=0xc) getsockname$packet(r5, &(0x7f0000000300)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, &(0x7f0000000340)=0x14) getsockopt$inet6_IPV6_XFRM_POLICY(r4, 0x29, 0x23, &(0x7f0000000580)={{{@in=@loopback, @in6=@ipv4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@dev}, 0x0, @in6=@initdev}}, &(0x7f00000003c0)=0xe8) r19 = socket$nl_route(0x10, 0x3, 0x0) r20 = socket(0x11, 0x800000003, 0x0) bind(r20, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r20, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r19, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r21, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r21, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) getsockname$packet(0xffffffffffffffff, &(0x7f0000000400)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000480)=0x14) getpeername$packet(r5, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000500)=0x14) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket(0x11, 0x800000003, 0x0) bind(r25, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r25, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r24, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r26, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r26, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) accept$packet(0xffffffffffffffff, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14) r28 = socket(0x100000000018, 0x0, 0x4) connect(r28, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) getsockname$packet(r28, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000780)=0x14) r30 = socket(0x100000000018, 0x0, 0x4) connect(r30, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) getsockopt$inet6_mreq(r30, 0x29, 0x0, &(0x7f00000009c0)={@dev, 0x0}, &(0x7f0000000a00)=0x14) sendmsg$TEAM_CMD_PORT_LIST_GET(r4, &(0x7f0000000f40)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000f00)={&(0x7f0000000a40)={0x4a4, r7, 0x200, 0x70bd2c, 0x25dfdbff, {}, [{{0x8, 0x1, r10}, {0x1d8, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r13}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r16}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r17}}, {0x8}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2ff}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r18}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x4}}}]}}, {{0x8, 0x1, r21}, {0x1dc, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r22}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'roundrobin\x00'}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x5}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffa}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0xfffffffe}}}, {0x40, 0x1, @queue_id={{{0x24, 0x1, 'queue_id\x00'}, {0x8}, {0x8, 0x4, 0xce39}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r26}, {0x80, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x1}}, {0x8, 0x6, r29}}}]}}, {{0x8, 0x1, r31}, {0x3c, 0x2, [{0x3df, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8}}}]}}]}, 0x4a4}, 0x1, 0x0, 0x0, 0xb9d26e11019e215a}, 0x8) dup3(r2, r6, 0x80000) 23:15:16 executing program 0: creat(&(0x7f00000001c0)='./bus\x00', 0xffffffffffdffffe) r0 = creat(&(0x7f00000000c0)='./bus\x00', 0x0) write$apparmor_current(r0, &(0x7f0000000380)=ANY=[@ANYRES64], 0x1) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ff}, 0x3004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lsetxattr$trusted_overlay_upper(&(0x7f0000000100)='./bus\x00', &(0x7f0000000200)='trusted.overlay.upper\x00', 0x0, 0x0, 0x0) r1 = open(&(0x7f0000000180)='./bus\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x8000fffffffe) write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$TCSETXF(0xffffffffffffffff, 0x5434, 0x0) creat(&(0x7f0000000140)='./bus\x00', 0x0) r2 = socket$packet(0x11, 0x3, 0x300) r3 = open(&(0x7f00000000c0)='.\x00', 0x0, 0x0) lseek(r3, 0xfffffffffffffffd, 0x0) ioctl$TUNGETDEVNETNS(r3, 0x54e3, 0x0) setsockopt$packet_int(r2, 0x107, 0xc, 0x0, 0x0) r4 = accept(r2, &(0x7f0000000000)=@ax25={{0x3, @rose}, [@null, @rose, @bcast, @remote, @rose, @netrom, @default, @null]}, &(0x7f0000000200)=0xdf1e586eda983c74) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_GET(r4, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1184200}, 0xc, &(0x7f0000000180)={&(0x7f0000000240)=ANY=[@ANYBLOB='@\x00\x00\x00', @ANYRES16=r5, @ANYBLOB="000027bd7000fbdbdf250300000008000800ac1e04010800040000000000000000aefe8800000000000000000000884371584300fdff00086f328541ee10835ad300060004000010a8f3f3f86ac711ddff208a2bec55addeec69d76235acd384803b8121a85c2a28c458488f1abe7ea32236948de0f3f1f8cdc9aa7c636623b53093280e9c13b9a6532cbd70acaf511ec23f0415b3f583ed4c82968b462944153df518605b80aeb5e680ed1d8bad9238247b8fa82ef4e253d9163f99ff016a8c36bdfed8c96acf8254542798d2444dbca273c2bec4f9bcba56"], 0x40}, 0x1, 0x0, 0x0, 0x4000000}, 0x40000) r6 = socket$packet(0x11, 0x3, 0x300) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, 0x0, 0x0) setsockopt$packet_int(r6, 0x107, 0x7, 0x0, 0x0) r7 = socket$inet6(0xa, 0x3, 0x3c) r8 = dup2(0xffffffffffffffff, r7) syz_open_procfs(0x0, &(0x7f0000000500)='\x00\xaeC\xae\xc4\x05\xa9\xbd~\xfb\xd3\x81\xff\x9c\xf1\xcc\xfe:4\x01\x01\x01\x00w\xa7\x04~\\\xd4Y\x04\xaf^\xc6\xf2\x98\"\xa0\xa1\x04\xaf\x81\x00ov0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:16 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:16 executing program 0: creat(&(0x7f0000000000)='./file0\x00', 0x0) r0 = open(&(0x7f0000000080)='./file0\x00', 0x40002, 0x0) futex(0x0, 0x0, 0x0, 0x0, 0x0, 0x0) socket$inet(0x2, 0x2, 0x80) syz_genetlink_get_family_id$tipc2(&(0x7f0000000640)='\n\xff@\x00') r1 = open$dir(&(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r2, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000740)=@updpolicy={0xfc, 0x19, 0x0, 0x0, 0x0, {{@in6=@mcast1, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0xa}, {}, {0x103}}, [@tmpl={0xa, 0x5, [{{@in=@remote, 0x0, 0x2b}, 0x0, @in=@empty, 0x0, 0x2}]}]}, 0xfc}}, 0x40480cd) socket$nl_xfrm(0x10, 0x3, 0x6) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000080)={0x0, 0x0, &(0x7f00000bfff0)={&(0x7f0000000740)=ANY=[@ANYBLOB="fc000000190001000000000000000000ff010000000000000000000000000001e000000100000000000000000000000000000000000000000a00000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000000000000000000000000000000000000000000000000000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000200000004db5a2599e786d3606e900b56b6e00000000000000000044000500ac1414bb000000000000000000000000000000002b000000000000000000000000000000000000000000000100000000020000000000"], 0xfc}}, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r4, &(0x7f0000000080)={0x0, 0x0, 0x0}, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) write$FUSE_DIRENT(r0, &(0x7f0000000440)=ANY=[@ANYPTR64=&(0x7f00000004c0)=ANY=[]], 0x8) keyctl$unlink(0x11, 0x0, 0xfffffffffffffffd) r5 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000800)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$RNDADDTOENTCNT(r5, 0x40045201, &(0x7f0000000840)=0xc19d) truncate(&(0x7f0000000240)='./file0\x00', 0x90002) ioctl$ASHMEM_GET_PIN_STATUS(r0, 0x7709, 0x0) keyctl$set_timeout(0xf, 0x0, 0x10001) sendfile(r0, r1, 0x0, 0x80000000) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, &(0x7f0000000140)=0x8800, 0x8800000) pipe2(&(0x7f0000000600)={0xffffffffffffffff, 0xffffffffffffffff}, 0x2c00) r7 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$sock_cred(r7, 0x1, 0x11, 0x0, &(0x7f0000000280)) setreuid(0x0, 0x0) getresgid(&(0x7f0000000900), &(0x7f0000000680), &(0x7f00000006c0)) write$P9_RGETATTR(r6, 0x0, 0x0) io_setup(0x0, &(0x7f00000000c0)) close(0xffffffffffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x1c, 0x0, 0x0) ioctl$TIOCGWINSZ(0xffffffffffffffff, 0x5413, &(0x7f00000007c0)) [ 479.669792] : renamed from ip_vti0 23:15:17 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:17 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', 0x0) writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) fcntl$F_SET_FILE_RW_HINT(r4, 0x40e, &(0x7f0000000000)=0xa) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) socket$inet(0x2, 0x3, 0x7f) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) ioctl$FICLONERANGE(r7, 0x4020940d, &(0x7f0000000100)={0xffffffffffffffff, 0x0, 0x9, 0x6, 0x7}) ioctl$KDMKTONE(r6, 0x4b30, 0x8) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 479.810317] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:17 executing program 0: socket(0x0, 0x0, 0x0) mkdir(0x0, 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x20210d1, 0x0) getsockname(0xffffffffffffffff, &(0x7f00000001c0)=@rc, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r0, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r0, 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) fcntl$dupfd(r1, 0x0, r1) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r3 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') renameat2(r2, &(0x7f0000000000)='./file0\x00', r3, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$sock_TIOCINQ(r2, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xd}, 0x0, 0x2, 0xfffffffe, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(0x0, 0x0) socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) epoll_create(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) setsockopt$inet_mtu(0xffffffffffffffff, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x8, 0xffffffffffffff00}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r4, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getsockopt$inet_IP_XFRM_POLICY(0xffffffffffffffff, 0x0, 0x11, &(0x7f00000003c0)={{{@in=@remote, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in6=@mcast1}}, 0x0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000001c0)=0x9) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000680)={0x0, 0x0, 0x0}, &(0x7f00000006c0)=0xc) r7 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='net\x00') r8 = syz_open_procfs(0x0, &(0x7f0000000080)='net\x00') renameat2(r7, &(0x7f0000000000)='./file0\x00', r8, &(0x7f0000000040)='./file0\x00', 0x0) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) lsetxattr$system_posix_acl(0x0, &(0x7f00000004c0)='system.posix\x9c\t\x00\x00\x00\x00\x00\x00\x00\x00ac\x03n\xf58\x00;d\x19G(5{E\xd5\\\xe79\n\x18\x00Xo\xddq\xec\xf7\x11\x13q\xba\x17\x9b\xb7]R\x9e\x0e\x19\xdc\x8fF\xe7\xfc\xe6\xfai\xd4j\x8cx\xb5\xb9\xa9\xf4\x82\x96\a\xbb\xe9*\xb3\x11\xcez\x9a\x91\xab\xd3m\x95\xfe\xab\xf9\xcc\xb7\x85&\xc0|\f\xd7\xa2 >o\x19/\xd1aC\xd3\xd7\xe5\x8eR', &(0x7f0000000a40)=ANY=[@ANYRES32=0xee01, @ANYBLOB="e62725d975b0ceb85863b7c4f8540fe0b4f0832f5bc5d4fc31300b88cfc1b239730a97060ab50a5542a78d6b51e07e8141e658baf63577a3e183901d010abded2004fb4e1385729efed97f9c33fe08655b2eea93327b629f66f5c80000000000", @ANYPTR, @ANYRESDEC, @ANYRES32, @ANYBLOB="08000200d29cfee83d23a475b03e384fc393c1f8b1ed0ec0f93400000002e3bfbc927114fa14b49d837a9965cf1cf244a69d0fd6fcdce6084e654e5e4cc392d1b25c0da0bcc52ea4bd89b92660988dbb820af038b6d6d4f0d8acf2f4bad14740043303", @ANYRES32=r6, @ANYRES32, @ANYRESOCT=r9], 0x9, 0x0) write$FUSE_CREATE_OPEN(0xffffffffffffffff, &(0x7f0000000580)={0xa0, 0xfffffffffffffffe, 0x4, {{0x3, 0x3, 0x2, 0x9, 0x400, 0x20, {0x1, 0x7fffffff, 0x0, 0xffff, 0x2, 0x100000001, 0x0, 0x0, 0x5, 0x1ff, 0x5, r5, r6, 0x9}}, {0x0, 0x4}}}, 0xa0) r10 = getegid() chown(&(0x7f0000000280)='./file0\x00', r5, r10) [ 480.195123] netlink: 68 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:17 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) ioctl$PERF_EVENT_IOC_SET_BPF(0xffffffffffffffff, 0x40042408, 0xffffffffffffffff) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) ustat(0x9, &(0x7f0000000000)) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$KDGKBDIACR(r5, 0x4b4a, &(0x7f0000000100)=""/70) 23:15:17 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000100)='/proc/self/net/pfkey\x00', 0x400202, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000000)) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xdbd7ec06, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:18 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socket(0x11, 0x2, 0x49) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:18 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:18 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$FUSE_DEV_IOC_CLONE(r3, 0x8004e500, &(0x7f0000000100)=r5) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) openat$selinux_load(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/load\x00', 0x2, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:18 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$ION_IOC_ALLOC(r1, 0xc0184900, &(0x7f0000000140)={0x1ff, 0x10, 0x0, 0xffffffffffffffff}) fallocate(r2, 0x0, 0x0, 0x0) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOC_PR_REGISTER(r4, 0x401870c8, &(0x7f0000000000)={0x9, 0x7, 0x1}) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r5, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) recvfrom(r6, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r9, r9, 0x0, 0x8800000) ioctl$int_in(r9, 0x5452, &(0x7f0000000100)=0x8) 23:15:19 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x13, 0xffffffffffffffff, 0xdadd9000) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:19 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKTRACESTART(r3, 0x1274, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[@ANYRES32, @ANYPTR=&(0x7f0000000180)=ANY=[@ANYBLOB="e27709c5e2d31c2d28d1d660890e1611d59ed5af8f886293931081ee043e61004149d78a8381e1f50b42bef699", @ANYPTR64], @ANYRES16=r3], 0xe) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000140)='/proc/self/net/pfkey\x00', 0x80, 0x0) ioctl$int_out(r6, 0x0, &(0x7f0000000100)) r7 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:19 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:20 executing program 4: r0 = creat(0x0, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) socket$packet(0x11, 0x3, 0x300) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0x5, &(0x7f00000000c0)=@req3={0x8000, 0x6, 0x8000, 0x0, 0xfffffffffffffffd}, 0x20b) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$RTC_UIE_OFF(r2, 0x7004) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) perf_event_open(&(0x7f00000001c0)={0x1, 0x3e1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) setsockopt$inet_tcp_int(r3, 0x6, 0x80000000000002, &(0x7f00000000c0)=0x2000000000000074, 0x25d) bind$inet(r3, &(0x7f0000000180)={0x2, 0x4e23, @multicast1}, 0x10) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f0000b86000)={0x1, &(0x7f0000f40ff8)=[{0x6, 0x0, 0x0, 0xe8}]}, 0x10) sendto$inet(r3, 0x0, 0x0, 0x200007fd, &(0x7f0000e68000)={0x2, 0x4e23, @local}, 0x27) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$unlink(0x9, 0x0, r4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000380)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r5, 0x40045431, &(0x7f00003b9fdc)) r6 = syz_open_pts(r5, 0x0) ftruncate(r6, 0x10001) keyctl$set_timeout(0xf, r4, 0x0) request_key(&(0x7f0000000040)='asymmetric\x00', 0x0, 0x0, r4) add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000080)={'syz'}, 0x0, 0x0, 0xffffffffffffffff) keyctl$set_timeout(0xf, 0x0, 0x0) setsockopt$sock_int(r3, 0x1, 0x8, &(0x7f0000000080)=0xda9, 0x4) sendto$inet(r3, &(0x7f0000000480)="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", 0x190, 0xc, 0x0, 0x0) 23:15:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) r2 = open(&(0x7f0000000000)='./file0\x00', 0x2000, 0x0) ioctl$ASHMEM_PURGE_ALL_CACHES(r2, 0x770a, 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r5 = open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) ioctl$TIOCGPTPEER(r5, 0x5441, 0x6) [ 483.245890] audit: type=1400 audit(1574723720.522:22): avc: denied { ioctl } for pid=26156 comm="syz-executor.3" path="socket:[46621]" dev="sockfs" ino=46621 ioctlcmd=0x8912 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:15:20 executing program 0: sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000003340)=[{{&(0x7f0000000000)={0xa, 0x4e22, 0x0, @dev}, 0x1c, 0x0, 0x0, &(0x7f0000000340)=[@flowinfo={{0x14, 0x29, 0xb, 0x3}}, @flowinfo={{0x14, 0x29, 0xb, 0x100000}}], 0x30}}], 0x1, 0x0) 23:15:20 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r1, 0x8, r2) r3 = syz_open_pts(r0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:15:20 executing program 4: pipe(&(0x7f0000000400)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = getpgrp(0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) vmsplice(r3, &(0x7f0000000380)=[{&(0x7f0000000080)="b169302e1f0cfb17298a2a4d0e25b73bc9359b79626184964a29c984a5987a2d3b42d696ac69ade09e08f56cf3de65786cf78a588a1ccf0222ad6abe5eca9e710569792d10afa788321d3b1affe4ee0a13e30a428a4ea3da9715bbb38b8f925ff6bbdd7a1caa8ba7b48d274979fe11cb103d5588db3ac2626329f1b625030924bab92b1e2bb62ea0392c0e9c1f165850a9dcea7c6746e6b8d7fa76601f3b7be270d0ae", 0xa3}, {&(0x7f0000000140)="5b30c6af9bac5d2d870fa84c778ccc8a6715d4af42200a68a22c468fd012cbfdea03e09cd2ea59ef5396e563a1107baca151d37aaf926ba1cbae0bd6e259350f3f608013f9a1e76baf20f30468ccd6896a50e79b59405623741bb839134288e847eb65acf08172cba7648606f5f9d76069686e332e7fa0cc6b1c168844eccbafeff0f8b65db33661feb0392cf503ca68b3355b4dc5ad5c501439d5630d3f6ee98ce5b94a664ae778bee419033fc49de9c9447b", 0xb3}, {&(0x7f0000000300)="5672d1f38a67c73b9445df5613163617505873692db191b243eb6f405dabc2f0e6685c6e610ec4bbeb9ac534154940a90a20183bde57e2178ecc9e978ad7c0b4dee4a4d2d9d844e8ab0475e1261328608f7f3da0e531ca577ff60bc4f304b426011d7c9621e8", 0x66}, {}, {&(0x7f0000000440)="ae8d680e24b50e4fc667597a9cf5c585e76204fa26cd3854622d076126825be39b861953993a63384ca6f7769ce7ec75d25d2df553614adab657d093ef3a25f0d658520000d6c9de1475ca033a86fdd7f93362fcca075ca954166627ba481501e162733e30611e23a7dc01fb1e2914e02686892078bbd6e4327934f627b6fe9e231f915ab80905cb95f91f5265205d1838", 0x91}, {&(0x7f0000000500)="cf8c1c6f4e4a325ed09901f3cfa6f5ca8c0eae9a2925e12a9d18db2a80dd9adbafcb85afab03483e1bf0cb0e485217b6cf4ce1c965ec664fd8bb9ce7e280079e74a8911ea55785f2c63555d0b4c6f1c099cdeeb7b6e41bcf374fdf0df6e1c7b3f021df335cc3ace6010a9ec0521b4e2d2413e98dd47670a154b2f0f1ba9f448d122edac808f1868531ca95feb2f6ff24117e1de1304caa6fa80c3a32de11e7398f141dd309fa4b2d2af717b3246e098b23da70f3272de49d1d574ff99f19785d69a2020f6ee5879500258ade74cb1dbcec1e9d420df526e2d45c99e87b91f5dfe0fc102afa", 0xe5}], 0x6, 0x8) perf_event_open(&(0x7f0000c86f88)={0x2, 0x70, 0xfffffffffffffffa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r2, 0x0, 0xffffffffffffffff, 0x0) rt_sigtimedwait(&(0x7f0000000040), 0x0, 0x0, 0x8) write(r1, &(0x7f00000001c0), 0xfffffef3) read(r0, &(0x7f0000000200)=""/250, 0x50c7e3e3) 23:15:20 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) r4 = creat(&(0x7f0000000000)='./file0\x00', 0x81) ioctl$SIOCGIFHWADDR(r4, 0x8927, &(0x7f0000000100)) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:20 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) read(r4, &(0x7f0000000100)=""/129, 0x81) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) r6 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/enforce\x00', 0x2000, 0x0) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) renameat(r6, &(0x7f0000000240)='./file0\x00', r7, &(0x7f0000000280)='./file0\x00') r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r8, r8, 0x0, 0x8800000) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r9, r9, 0x0, 0x8800000) r10 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) r11 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r11, r11, 0x0, 0x8800000) poll(&(0x7f0000000000)=[{r0, 0x10}, {r5}, {r8, 0x180}, {r9, 0x8}, {r2, 0x1102}, {r10, 0x300}, {r11, 0x5022}], 0x7, 0x3) r12 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x3ba8ee73dc766e96, 0xe1c401bd6e6e1be4) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r2, &(0x7f0000000040)=""/170, 0xac, 0x1, 0x0, 0xffffffffffffff49) 23:15:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:21 executing program 0: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), &(0x7f0000000280)=0xfffffffffffffff6) socket$nl_route(0x10, 0x3, 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) bpf$OBJ_GET_PROG(0x7, 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) getsockopt$inet6_tcp_buf(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) ioctl$TCSETA(0xffffffffffffffff, 0x5406, &(0x7f00000001c0)={0x200, 0x0, 0x0, 0x4, 0xf, 0x6, 0xff, 0x0, 0xab}) setsockopt$sock_int(0xffffffffffffffff, 0x1, 0xb, &(0x7f0000000100)=0x4, 0x4) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) setsockopt$packet_tx_ring(0xffffffffffffffff, 0x107, 0xd, &(0x7f0000000040)=@req3={0x10000, 0x100000001, 0x10000}, 0x4c2) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x100000000018, 0x0, 0x4) dup3(r0, r1, 0x0) recvmmsg(r0, &(0x7f0000001d80)=[{{&(0x7f0000000380)=@ethernet, 0x80, &(0x7f0000001640)=[{&(0x7f0000000080)=""/46, 0x2e}, {&(0x7f0000000400)=""/132, 0x84}, {&(0x7f00000004c0)=""/82, 0x52}, {&(0x7f0000000540)=""/104, 0x68}, {&(0x7f00000005c0)=""/103, 0x67}, {&(0x7f0000000640)=""/4096, 0x1000}], 0x6, &(0x7f00000016c0)=""/143, 0x8f}, 0x77ea8c0f}, {{&(0x7f0000001780)=@l2, 0x80, &(0x7f0000001c40)=[{&(0x7f0000000140)=""/37, 0x25}, {&(0x7f0000001800)=""/236, 0xec}, {&(0x7f0000001900)=""/174, 0xae}, {&(0x7f00000019c0)=""/144, 0x90}, {&(0x7f0000001a80)=""/160, 0xa0}, {&(0x7f0000001b40)=""/246, 0xf6}], 0x6, &(0x7f0000001cc0)=""/173, 0xad}, 0xbb}], 0x2, 0x1050, &(0x7f0000000240)={0x77359400}) getsockname$packet(0xffffffffffffffff, 0x0, &(0x7f00000001c0)) socket$packet(0x11, 0x2, 0x300) openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) socket(0x1, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) setsockopt$inet_tcp_int(0xffffffffffffffff, 0x6, 0x12, &(0x7f0000000000)=0x44f7d067, 0x4) 23:15:21 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) write$FUSE_INTERRUPT(r1, &(0x7f0000000140)={0x10, 0x0, 0x2}, 0x10) sendmmsg$inet(r0, &(0x7f0000000080)=[{{&(0x7f0000000000)={0x2, 0x4e24, @empty}, 0x10, 0x0, 0x0, 0x0, 0xfffffffffffffe48}}, {{&(0x7f0000000280)={0x2, 0x4e1f, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0xc, 0x0, 0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="1800000000004f000000000007000000839d04ac14140000"], 0x18}}], 0x59f, 0x0) 23:15:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, 0x0, 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:21 executing program 0: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) setrlimit(0x40000000000008, &(0x7f0000000000)={0x4847, 0xfffffffffffff001}) mlock(&(0x7f0000ff9000/0x3000)=nil, 0x3000) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x2400, 0x6) capset(&(0x7f0000000080)={0x19980330}, &(0x7f00009b3000)) mlock(&(0x7f0000ffa000/0x3000)=nil, 0x3000) 23:15:21 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) [ 483.879083] capability: warning: `syz-executor.0' uses 32-bit capabilities (legacy support in use) 23:15:21 executing program 0: r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x71, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, r0, 0x0) r1 = open(&(0x7f0000000080)='./file0\x00', 0x40c5, 0x0) r2 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r2, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r3 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x3, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) r4 = dup2(r2, r3) r5 = getegid() ioctl$TUNSETGROUP(r4, 0x400454ce, r5) getgroups(0x7, &(0x7f00000004c0)=[0x0, 0xee00, 0xee01, 0xffffffffffffffff, r5, 0x0, 0x0]) ioctl$TUNSETGROUP(r1, 0x400454ce, r5) pipe2(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4000) ioctl$int_in(r6, 0x5452, &(0x7f00000000c0)=0x80000000) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x0, 0x0) write$9p(r1, &(0x7f0000001400)="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", 0x600) sendfile(r1, r7, 0x0, 0x10000) 23:15:21 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) sendfile(r1, r0, 0x0, 0x8800000) fcntl$setflags(r0, 0x2, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket(0x100000000018, 0x0, 0x4) connect(r4, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) setsockopt$SO_BINDTODEVICE(r4, 0x1, 0x19, &(0x7f0000000000)='bcsh0\x00', 0x10) r5 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$BLKALIGNOFF(r7, 0x127a, &(0x7f0000000240)) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) r10 = openat$selinux_mls(0xffffffffffffff9c, &(0x7f0000000280)='/selinux/mls\x00', 0x0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0xffffffffffffffbe) accept4$packet(r9, &(0x7f0000000100), &(0x7f0000000140)=0x14, 0x80000) r11 = socket$inet(0x2, 0x1, 0x0) bind$inet(r11, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r11, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r12 = socket(0x100000000018, 0x0, 0x4) dup3(r11, r12, 0x0) getsockopt$sock_timeval(r12, 0x1, 0x14, &(0x7f00000001c0), &(0x7f0000000200)=0x10) openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x400000, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r13) recvfrom(r13, &(0x7f0000000040)=""/160, 0xa0, 0x40012500, 0x0, 0x0) 23:15:22 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r1, 0x8, r2) r3 = syz_open_pts(r0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:15:22 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r1, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r2 = socket(0x100000000018, 0x0, 0x4) r3 = dup3(r1, r2, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(r1, 0x5411, &(0x7f0000000000)) setsockopt$SO_BINDTODEVICE(r2, 0x1, 0x19, &(0x7f00000000c0)='ip_vti0\x00', 0x10) r4 = socket$inet6_tcp(0xa, 0x1, 0x0) r5 = fcntl$dupfd(r4, 0x0, r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x2400, 0x1ff) r8 = accept$inet6(r3, &(0x7f0000000040)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000140)=0x1c) setsockopt$inet6_tcp_TCP_REPAIR_QUEUE(r8, 0x6, 0x14, &(0x7f0000000180)=0x1, 0x4) connect$inet(r0, &(0x7f0000000100)={0x2, 0x0, @rand_addr=0x80000000}, 0x10) sendmmsg(r0, &(0x7f0000007fc0), 0x400000000000030, 0x0) 23:15:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x64) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:22 executing program 4: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$zero(0xffffffffffffff9c, &(0x7f0000000080)='/dev/zero\x00', 0x421180, 0x0) r1 = bpf$BPF_MAP_GET_FD_BY_ID(0xe, &(0x7f0000000140)={0x0, 0xc030}, 0xc) r2 = open$dir(&(0x7f0000000180)='./bus\x00', 0x0, 0x10) dup2(r1, r2) write$P9_RLINK(r0, &(0x7f0000000100)={0x7, 0x47, 0x1}, 0x7) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffff7fffffffff, 0xffffffffffffffff, 0x0) bind$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x4e24}, 0x10) r3 = creat(&(0x7f0000000200)='./file0\x00', 0x21) finit_module(0xffffffffffffffff, 0x0, 0x5) fcntl$setstatus(r3, 0x4, 0x4002) io_setup(0xb, &(0x7f0000000040)=0x0) io_submit(r4, 0x8, &(0x7f0000000540)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x0, r3, &(0x7f0000000000), 0x200a00}]) r5 = open(&(0x7f0000000780)='./bus\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x600000)=nil, 0x600000, 0x0, 0x4002011, r5, 0x0) 23:15:22 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) eventfd2(0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$EVIOCGUNIQ(r1, 0x80404508, &(0x7f0000000040)=""/85) lstat(0x0, 0x0) r2 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r2}, 0x2c, {'rootmode', 0x3d, 0x4000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd'}, 0x2c, {'rootmode'}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) 23:15:22 executing program 0: r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$BLKPG(r0, 0x1269, &(0x7f0000000100)={0x0, 0x6, 0x16, &(0x7f00000000c0)="15e8b9df296e4758b965afb5a25d7caae9b1531c96fc"}) mmap$binder(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1, 0x11, r0, 0x800000040000000) r1 = syz_open_dev$binderN(0x0, 0x0, 0x0) mmap$binder(&(0x7f00005a6000/0x1000)=nil, 0x1000, 0x1, 0x11, r1, 0x0) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$sock_inet_SIOCSARP(0xffffffffffffffff, 0x8955, &(0x7f0000000340)={{0x2, 0x4e22, @empty}, {0x1, @random="06e5b2716c5f"}, 0x0, {0x2, 0x0, @local}, 'veth1\x00'}) perf_event_open(&(0x7f00000004c0)={0x2, 0x70, 0x70, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x40, 0x0, 0x0, 0x0, 0x1000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000004c0)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socket$nl_route(0x10, 0x3, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x510, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) accept$inet6(r2, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000200)=0x1c) poll(&(0x7f0000000100), 0x0, 0x1) sysinfo(0x0) pidfd_open(0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) r4 = socket(0x10, 0x803, 0x0) r5 = socket(0x11, 0x800000003, 0x0) bind(r5, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r5, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route(r4, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000003c0)=ANY=[@ANYBLOB="2c000000130001000000000000000007000000002c73c0e836e347f921325a33393d8f1ddf54d7761403aaa56f7a108c7dd25640d343a4484aa89a02aedc4b01fedb88d3b9391158c4ed04255bd635207bba4b4bf57576d2343c54605073cdfa8cbd3dc718ce82c8b030218c152bdde3d82f7a8df0747c3b35c1fdfaa14bdf95aff727f2e720c2f036986890942dbc0d65e305673982106045b6e5aba7083b1cb0032bd0", @ANYRES32=r6, @ANYBLOB="00000000000000000c001a000800000004000000"], 0x2c}}, 0x0) ioctl$sock_inet6_SIOCSIFADDR(r3, 0x8916, &(0x7f0000000240)={@local, 0x44, r6}) r7 = socket$unix(0x1, 0x5, 0x0) bind$unix(r7, &(0x7f0000003000)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) listen(r7, 0x0) syz_genetlink_get_family_id$tipc(&(0x7f0000000180)='TIPC\x00') sendmsg$TIPC_CMD_GET_LINKS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x261000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000280)={0x24, 0x0, 0x200, 0x0, 0x0, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x7}}, [""]}, 0x24}, 0x1, 0x0, 0x0, 0x40000}, 0x0) sendmsg$TIPC_CMD_DISABLE_BEARER(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x8080}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x8800}, 0x20040010) r8 = socket$unix(0x1, 0x5, 0x0) connect(r8, &(0x7f0000931ff4)=@un=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0xc) gettid() gettid() setsockopt$packet_buf(r2, 0x107, 0x0, &(0x7f0000000240), 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) 23:15:22 executing program 4: getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000040), 0x0) mkdir(&(0x7f0000000340)='./file0\x00', 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) bind$inet(r0, &(0x7f0000000100)={0x2, 0x0, @local}, 0x10) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000140)=0x32, 0x4) connect$inet(r0, &(0x7f00000001c0)={0x2, 0x0, @broadcast}, 0x50) r1 = socket$inet(0x2, 0xa, 0x8) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f0000000280)={'security\x00', 0x4, [{}, {}, {}, {}]}, 0x68) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x500) r2 = dup3(r0, 0xffffffffffffffff, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000000)=0x900, 0x4) r3 = accept$inet6(r2, &(0x7f0000000380)={0xa, 0x0, 0x0, @remote}, &(0x7f00000003c0)=0x1c) ioctl$sock_inet_SIOCGIFBRDADDR(r3, 0x8919, &(0x7f0000000400)={'bpq0\x00', {0x2, 0x4e24, @multicast1}}) clone(0x3000000a0160101, 0x0, 0x0, 0x0, 0x0) mkdir(&(0x7f00000000c0)='./file1\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000180)='sysfs\x00', 0x0, 0x0) poll(0x0, 0x0, 0xffffffff) ioctl$TCSETA(0xffffffffffffffff, 0x5406, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) write$P9_RREAD(r4, &(0x7f0000000240)={0x40, 0x75, 0x2, {0x35, "bc0ab7d8940ba8a07091dbed48d32babe9fd8708289d1277f2c977c75f238bc5aa724178c643892572ff7014574d652f3f356f95e5"}}, 0x2a) rename(&(0x7f0000000300)='./file1\x00', &(0x7f0000000040)='./file0\x00') socket$packet(0x11, 0x0, 0x300) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) 23:15:22 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000180)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = epoll_create(0x5) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) fcntl$lock(r4, 0x24, &(0x7f0000000100)={0x0, 0x0, 0x7f, 0x762, r5}) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 485.252206] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x240801, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r4, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r5 = socket(0x100000000018, 0x0, 0x4) dup3(r4, r5, 0x0) r6 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r5, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x3421c120}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x2c, r6, 0xb8b, 0x70bd29, 0x25dfdbfd, {}, [@FOU_ATTR_IPPROTO={0x8, 0x3, 0x33}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @dev={0xac, 0x14, 0x14, 0x14}}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}]}, 0x2c}, 0x1, 0x0, 0x0, 0x8000001}, 0x40000) [ 485.448423] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.0'. 23:15:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:27 executing program 0: clone(0x100, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000002, 0x0) vmsplice(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}, {0x0}, {0x0}, {&(0x7f00000001c0)="6653070000053c07bc3376003639405cb4aed12f0000000000ae47a825d86800278dcff47d010000805ae64f8f364602344324", 0x33}], 0x4, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x3c) ptrace$cont(0x18, r0, 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$cont(0x20, r0, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='memory.swap.current\x00', 0x0, 0x0) socketpair(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x89f2, &(0x7f0000000140)='sit0\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = socket(0x4, 0xa, 0xff) r6 = socket(0x10, 0x3, 0x80) r7 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(r6, &(0x7f00000001c0)={0x0, 0xff6e, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r7, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) sendmsg$TIPC_CMD_GET_NODES(r5, &(0x7f0000000140)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)={&(0x7f0000000080)={0x1c, r7, 0x4, 0x70bd25, 0x25dfdbfe, {}, ["", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x1}, 0x10044109) r8 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = fcntl$dupfd(0xffffffffffffffff, 0x406, r6) getsockname$packet(r2, &(0x7f0000000180)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000200)=0x14) ioctl$sock_inet6_SIOCSIFDSTADDR(r9, 0x8918, &(0x7f0000000240)={@local, 0x14, r10}) bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000000)=r8, 0x4) 23:15:27 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x1, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x32, 0x0, 0x1ff, 0x0, 0x0, 0x5}, 0x0, 0x7, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000000)='cpuacct.usage_user\x00', 0x0, 0x0) 23:15:27 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r0, 0x40045431, &(0x7f00003b9fdc)) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r1, 0x8, r2) r3 = syz_open_pts(r0, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r0, 0x541c, &(0x7f0000000040)) r4 = accept4$unix(0xffffffffffffffff, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r4, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r3, r0, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r5, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r5, 0xc0406619, 0x0) 23:15:27 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x1, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ftruncate(r2, 0x9fd) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:27 executing program 4: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x82, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x3f, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000000300)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='ramfs\x00', 0x50, 0x0) r0 = creat(&(0x7f0000000040)='./file0/bus\x00', 0x179) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) r1 = open(&(0x7f0000021000)='./file0\x00', 0x0, 0x0) fchdir(r1) r2 = open(&(0x7f0000000000)='./bus\x00', 0x141042, 0x0) write$P9_RREADLINK(r2, &(0x7f0000000340)=ANY=[@ANYBLOB="ffd934aa54cd0d18009c5b724e1ea240046f13012f66b00000bb61f5d662d483cbdb81774be73702e80a17d901c8864299bdf63f480f0fa6decf4aa7a016e5c83343aaf66d08dbd5456da5522ae5430dba62d6c2f60f260606b91f912d44084b8f9c851c9da49dcb39997739f49a92d04c90ee20c45d68409cd8c2a706a34c1a83ff599f611e4756ce74a237173e571d1f2bc935aaf88d959f22f6b7e9e60246502d3bdfbf405aecbdb774c7791c5108e0154ad65b0326be4da9479c06d2b082738f5f8360"], 0x1f) r3 = socket(0x100000000018, 0x0, 0x4) connect(r3, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) sendmsg$NET_DM_CMD_START(r3, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x0, 0x400, 0x70bd2a, 0x25dfdbff, {}, ["", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x40000}, 0x200260e4) sendfile(r2, r2, &(0x7f0000000240), 0x7fff) 23:15:27 executing program 4: socket$nl_xfrm(0x10, 0x3, 0x6) perf_event_open(&(0x7f00000002c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:15:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x0) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:27 executing program 4: r0 = socket$inet_udp(0x2, 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) bind$inet(r0, &(0x7f0000000040)={0x2, 0x0, @local}, 0x10) r3 = socket$packet(0x11, 0x4000000000000003, 0x300) setsockopt$SO_ATTACH_FILTER(r3, 0x1, 0x1a, &(0x7f0000fbe000)={0x2, &(0x7f0000000000)=[{0x28, 0x0, 0x0, 0xfffff028}, {0x80000006}]}, 0x10) connect$inet(r0, &(0x7f0000000340)={0x2, 0x0, @rand_addr=0x5}, 0xffffffffffffff59) sendmmsg(r0, &(0x7f0000007fc0), 0x4000000000001a8, 0x0) 23:15:27 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:27 executing program 4: r0 = socket$inet(0x2, 0x3, 0xdc) setsockopt$sock_int(r0, 0x1, 0x29, &(0x7f0000000040)=0xa0800000, 0x3db) sendto$inet(r0, 0x0, 0x0, 0x0, &(0x7f0000514ff0), 0x10) 23:15:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$RTC_SET_TIME(0xffffffffffffffff, 0x4024700a, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001380)=[{&(0x7f0000001200)=""/148, 0x94}], 0x100001c9, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/netlink\x00') preadv(r0, &(0x7f0000000480), 0x10000000000002a1, 0x10400003) r1 = socket$inet6(0xa, 0x400000000001, 0x0) r2 = dup(r1) syz_genetlink_get_family_id$ipvs(&(0x7f0000000080)='IPVS\x00') getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000240)={{{@in=@empty, @in6=@dev}}, {{@in=@remote}, 0x0, @in6=@local}}, &(0x7f00000000c0)=0xe8) sendmsg$IPVS_CMD_NEW_DEST(r2, &(0x7f0000000140)={&(0x7f0000000040), 0xc, 0x0, 0x1, 0x0, 0x0, 0x83f38cc44489b56d}, 0x4044045) rt_sigsuspend(0x0, 0x0) umount2(&(0x7f0000000200)='./file0\x00', 0x0) 23:15:27 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_misc(r0, &(0x7f0000000100)=ANY=[], 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = dup2(r3, r4) chdir(&(0x7f0000000100)='./file0\x00') ioctl$BLKIOMIN(r5, 0x1278, &(0x7f0000000000)) r6 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/170, 0x4fbb323c, 0x659781f95b42ff75, 0x0, 0xfe62) 23:15:27 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = perf_event_open(&(0x7f0000000100)={0x4, 0x70, 0x3f, 0x4, 0x2, 0x8, 0x0, 0x100000001, 0xc, 0x5, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x806, 0x7, @perf_bp={&(0x7f0000000000), 0x1}, 0x2013, 0xd1f, 0x8, 0x0, 0x0, 0x6, 0x8}, r0, 0xb, r2, 0x1) fcntl$setsig(r3, 0xa, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r4, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) r8 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r8, 0xc0506617, &(0x7f0000000180)={{0x2, 0x0, @reserved="3cea0536f543305966d597dad2d1d7e13381a3d777c1107cdd9fd72d172fcc26"}, 0x1c, [], "990d1946e88541ad49b422723ffa9d0f61a3f8257fc394e35fec42e0"}) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvfrom(r5, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:27 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x2}, 0x6410, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x13) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000006c0)=""/157) socket$inet(0x2, 0xa, 0x0) timer_create(0x0, &(0x7f0000000480)={0x0, 0x32, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000007c0)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_UNALIGN(0x6, 0x0) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r4) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x3, 0x6, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x7, 0x7, 0x0, 0x62}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) shutdown(0xffffffffffffffff, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r3}}, {@uid_lt={'uid<', r6}}, {@smackfstransmute={'smackfstransmute'}}]}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}}, 0x2040000) 23:15:28 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:28 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, 0x0, 0x0, 0x2001001, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x2}, 0x6410, 0x0, 0x0, 0x0, 0x0, 0x6, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$binderN(&(0x7f0000000100)='/dev/binder#\x00', 0x0, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(0xffffffffffffffff, 0x40046207, 0x0) ioctl$BINDER_WRITE_READ(0xffffffffffffffff, 0xc0306201, 0x0) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) openat$fuse(0xffffffffffffff9c, &(0x7f0000000100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, 0x0, &(0x7f0000000300)='fuse\x00', 0x0, 0x0) r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000680)='/selinux/avc/hash_stats\x00', 0x0, 0x0) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x40, 0x13) ioctl$TUNGETDEVNETNS(r1, 0x54e3, 0x0) ioctl$EVIOCGBITSW(r0, 0x80404525, &(0x7f00000006c0)=""/157) socket$inet(0x2, 0xa, 0x0) timer_create(0x0, &(0x7f0000000480)={0x0, 0x32, 0x1, @tid=0xffffffffffffffff}, &(0x7f00000007c0)=0x0) timer_settime(r2, 0x0, &(0x7f00000001c0)={{0x0, 0x989680}}, 0x0) ftruncate(0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(0xffffffffffffffff, 0xc020660b, 0x0) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) prctl$PR_SET_UNALIGN(0x6, 0x0) getresgid(&(0x7f0000000040), &(0x7f00000002c0), &(0x7f0000000500)=0x0) setgid(r4) perf_event_open(&(0x7f0000000580)={0x0, 0x70, 0x0, 0x3, 0x6, 0x9, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000540), 0xf2d8b275e8d6173b}, 0x0, 0x0, 0x9, 0x7, 0x7, 0x0, 0x62}, 0xffffffffffffffff, 0xc, 0xffffffffffffffff, 0x0) r5 = openat$fuse(0xffffffffffffff9c, &(0x7f0000001100)='/dev/fuse\x00', 0x2, 0x0) mount$fuse(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000300)='fuse\x00', 0x0, &(0x7f0000001500)={{'fd', 0x3d, r5}, 0x2c, {'rootmode', 0x3d, 0x8000}, 0x2c, {'user_id'}, 0x2c, {'group_id'}}) shutdown(0xffffffffffffffff, 0x1) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'\x00\x02\x00', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r3}}, {@uid_lt={'uid<', r6}}, {@smackfstransmute={'smackfstransmute'}}]}) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') sendmsg$nl_route(0xffffffffffffffff, &(0x7f00000004c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)=@getaddr={0x14, 0x16, 0x200, 0x70bd29, 0x25dfdbfd, {}, ["", "", "", "", ""]}, 0x14}}, 0x2040000) 23:15:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) write$FUSE_WRITE(0xffffffffffffffff, &(0x7f0000000340)={0x18, 0xfffffffffffffffe, 0x8, {0x8}}, 0x18) write(r2, &(0x7f0000000100)="50dfa8c767450db67146dfaa39595f2aa7289c705deed69a83de4770200dba0931e92f8fc70d9ad0c4915a27a06c35bd9faabc2097c9df4a4546339fe526be4e3a9583b3ceded63ce3274636a080e3dff031c51334920008febb38c0515267f2a37b4c47dc7898ce0bffbb0a17099356a9fc19d0ce41b055b0ec40f79c61265034d1231e80820fb66a4b91987fe55fa58f773cdf6ab9ee5680eb44ba650dab5da7fdbdddd56544b3dd9e4e1eda6e3e5f3c1167415f2986d2d10ebf591adfa83cb3b4bdfb740f6c91c494bdf3d64c6c253d31dab3e5", 0xd5) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') ftruncate(r1, 0x100000001) r5 = add_key$keyring(0x0, &(0x7f0000000180)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r5, 0x5190e0d) keyctl$get_security(0x11, r5, 0x0, 0x0) r6 = request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='\x00', r5) r7 = add_key$keyring(0x0, &(0x7f0000000180)={'\x10\x00', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) keyctl$setperm(0x5, r7, 0x5190e0d) keyctl$get_security(0x11, r7, 0x0, 0x0) request_key(&(0x7f0000000100)='cifs.idmap\x00', &(0x7f0000000140)={'syz', 0x1}, &(0x7f0000000180)='\x00', r7) request_key(&(0x7f0000000000)='user\x00', &(0x7f0000000040)={'\x00', 0x2}, &(0x7f00000003c0)='+\x00', r5) keyctl$KEYCTL_PKEY_ENCRYPT(0x19, &(0x7f0000000000)={r6, 0xeb, 0x9b}, 0x0, &(0x7f0000000240)="6cdbad229e4a15d669db790382030f665b150ec52454445e6507a94e407d37470e7c8540708bb5d1e84652b7f09d402b1ea6c3b774ebb2f6de1fab4d22a8dfb5fa18716533ce5b9b547417668e1a02a76a56211432c7b61a3c6f62f298f4d332df9e6eb27f9ad3bc2935675238e47832444918252c195a3803b1ee15664f3331fae6a7d796267467379cc8f54a24111f7c25a63030b9f59773dcd36e5d8bfe32cf982ad0c9a048d547b0055d0c9070b9125f49bc60e2ef9bfcecd6baa841348686f621465fb06b61894e49e1c3820eff3d768d044f369864e52bfa60f90e92e1efddc59ecd0b9800594308", &(0x7f0000000480)=""/155) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r8 = socket$nl_generic(0x10, 0x3, 0x10) fsetxattr$trusted_overlay_nlink(r8, &(0x7f0000000400)='trusted.overlay.nlink\x00', &(0x7f0000000580)={'U+', 0x647}, 0x28, 0x2) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:28 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) r0 = openat$selinux_avc_cache_stats(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/avc/cache_stats\x00', 0x0, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) sendfile(r0, r1, &(0x7f0000000140)=0x3, 0x4) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0x84f0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket(0x100000000018, 0x0, 0x4) connect(r6, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) r7 = socket(0x10, 0x3, 0x80) r8 = syz_genetlink_get_family_id$tipc(0x0) sendmsg$TIPC_CMD_GET_LINKS(r7, &(0x7f00000001c0)={0x0, 0xff6e, &(0x7f0000000140)={&(0x7f0000000100)={0x24, r8, 0x300, 0x70bd2a, 0x25dfdbfc, {{}, 0x0, 0x4, 0x0, {0x8, 0x11, 0x4}}, ["", "", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x20000000}, 0x40) sendmsg$TIPC_CMD_SET_LINK_PRI(r6, &(0x7f00000002c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000280)={&(0x7f0000000200)={0x68, r8, 0x402, 0x70bd25, 0x25dfdbfb, {{}, 0x0, 0x4108, 0x0, {0x4c, 0x18, {0xffffffff, @media='udp\x00'}}}, ["", "", "", "", "", "", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x10000002}, 0x8004000) getpeername$packet(0xffffffffffffffff, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000180)=0x14) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 491.022442] audit: type=1400 audit(1574723728.302:23): avc: denied { setattr } for pid=26591 comm="syz-executor.3" name="NETLINK" dev="sockfs" ino=46078 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=netlink_generic_socket permissive=1 23:15:28 executing program 4: openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100)='/dev/ptmx\x00', 0x0, 0x0) syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='stat\x00') openat$uinput(0xffffffffffffff9c, &(0x7f0000000140)='/dev/uinput\x00', 0x0, 0x0) socket$packet(0x11, 0x2, 0x300) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_genetlink_get_family_id$tipc2(&(0x7f00000001c0)='TIPCv2\x00') sendmsg$TIPC_NL_LINK_RESET_STATS(r0, &(0x7f0000000580)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x4142041}, 0xc, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="00030000", @ANYRES16=r2, @ANYBLOB="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"], 0x300}, 0x1, 0x0, 0x0, 0x400c454}, 0x8040) r3 = dup2(r1, r1) ioctl$SNDRV_TIMER_IOCTL_GSTATUS(r3, 0xc0505405, &(0x7f0000000000)={{0x0, 0x3, 0x8000, 0x3, 0xfffffffc}, 0x2, 0x0, 0x8}) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/net/pfkey\x00', 0x40, 0x0) setsockopt$inet6_int(r4, 0x29, 0x29fcf8e8962a3e3f, &(0x7f0000000280)=0x80000000, 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) pselect6(0x40, &(0x7f00000000c0), 0x0, &(0x7f0000000140)={0x1ff}, &(0x7f0000000200)={0x0, 0x1c9c380}, 0x0) [ 491.215505] audit: type=1400 audit(1574723728.502:24): avc: denied { write } for pid=26605 comm="syz-executor.4" name="net" dev="proc" ino=47114 scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 491.321627] audit: type=1400 audit(1574723728.602:25): avc: denied { add_name } for pid=26605 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=dir permissive=1 [ 491.430306] audit: type=1400 audit(1574723728.712:26): avc: denied { create } for pid=26605 comm="syz-executor.4" name="pfkey" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:object_r:insmod_t:s0 tclass=file permissive=1 23:15:28 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) io_setup(0x951, &(0x7f0000000000)=0x0) r3 = openat$tun(0xffffffffffffff9c, &(0x7f0000000100)='/dev/net/tun\x00', 0x81040, 0x0) r4 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000240)='/selinux/enforce\x00', 0x100, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) pipe2(&(0x7f00000003c0)={0xffffffffffffffff}, 0x0) r9 = creat(&(0x7f0000000480)='./file0\x00', 0x40) io_submit(r2, 0x4, &(0x7f0000000500)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x8, 0x0, r3, &(0x7f0000000140)="36ecc6a8a96e2011c474d1443ced596d09d90d556c2cd56ef0adfe5db85ebd917807b25f50d79131e5ffeefc795f2a4a44ed9eff92925c4083420eef5ab4829ce22c34fe0f0ef70b055bb83e5a2ef8bcb0f0b01951f906b9e83072f2a36778b335b07f363c66b2fe5f6cbfb6c2fe2bd6207fcc6ea5f85e7fae672ddf5c77a3945d25d96919c3d8f7114bff1d91576c0cc13b7c89f7e36089", 0x98, 0x1000, 0x0, 0x2, r4}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0x7ff, r0, &(0x7f00000002c0)="dd859f092f369aab087397341851201118447e23e20bf9d0ebc93f8cb8007f1c8330882873c189e340c4643b25abc1f5a5aebfcf4cf321e08d4c671ae795f5779f43f826754a214e67e3f66d0ab54aa5e9780e96", 0x54, 0x7, 0x0, 0x2, r6}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x3, 0x1, r7, &(0x7f0000000380)="f4771613dc4c10b1a5c84a089953ba7af5aa28", 0x13, 0x5, 0x0, 0x2, r8}, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0xfff7, r1, &(0x7f0000000580)="45126055a5821a4c6936da36d1e6e070307384fdcd277f5449b5e367908641d39b525b326ee4d2d99986f0863d637d3a32976efcf307847ef75a017f7740712e6892e23ae3a826f4b06b9755225d6f7bfc9233016d491ea9938e17b1e2065b78d70b846dae22dea8a5dafe1cae5701f05a074ef8423e248ef39a61807026c13f6bfac9e38d30047bde29d8e7d56c5fe0a3dd4fb035ed97670ef2893b2322a0a4278b75c676c14c8990dc0c39a66df5673e0dcf13073da37366a7041c107616113166e0878849f99313b1ad746d1f44089c036056479ca988c342725db5aff3445b82463553dac6b4c41c5c42a230f37e331e80cd4326ccd3da301c3f5f96019f5f36ea9a9e5b1d4b8e20583305c5430966fae365a6a2e4f7c3c34603c377b4639ebf4102821352b07fa35fd2bbf5186aa7adad3f5ce44e776e25ba368942afcff06646912a7fb7dc034f0cc201f683bcf3fdf880d5f0d4d1792fcf79e2f6e3b685644cf31a5e6a193dd9a561c43902bfd46042d1dffa95853bf9b7504ad7cc50316e80bc5a8ed0fa903aa2559310b104229fd3ce5c0d7a0c6f75e4e91a6cf75a10c657a8e346aa865f2a4df99e783202fe3635858a8fb6810aac5e496f0c39334fbac9fac9566dd92e042433b1c52f1eed9f04660fc0a5777fef6be27e78b459661cf51095c04d242b3fd1f923a4ad9fb7cc628bb4535a9b791a8f66f0c9daf358db42afbed1a1f35d8ec4b78e901d784d7e237ba7d249ed62a115cf4918a29019189facafaf3b37b23db9f12b43958ec991ad44aba960d22881e87eb2ad89532d5337f5640a1fb5b0d25c787de77f0d7ed2e81e91c85ed1197df12651ae54c8ce54539e02f03d3d075466a05fc366142a0a611a1a9ab2b4ce214135e8050c9e112f93b0b6b1d42f0b2c7ff4b3c712fee79f6a74c4df0cc85492b91996043e199604dab77783022a7807ca07468ae8f3ed43c7c5f202f03e1576dc2ffff9f1090d83a3e3a868375b5b09c90ca170fd943a9eb30b39ede461748f84945972049b18b6839296143c83a058d7414edd595836b6cd2bfe2d275b17b57bf41bc348d42b2d93d94d00ddeb77855336d4e530190127ee49ed6144089a61abd42da5a24fde2e06acc5a0665d9f0f1683ef8d213e93796ee6485838ff7a249b6fa01f88f0100fc6001e715d25ef84c48aafa62bbc72ae207b1c31def9e5cc12bb0f7f86df43696c8679af13edf272b0f6ec95b7bbc2b2b9f940e7e800014e572917132705d36b0ce42d6d4b32582ef3fc2a006fb34bbf6eef9404294354c5620837629702652e3194f37cbb10176155ba1019c032168f84b0a84b557c594780adfd2a406e573a36e1235d1b2d17bad8a06902b8c56a505483dd3eed7354125a13e46dc12f02ba5b0d9909e8759b16e517a40a77273bec85df9f1020acf88541f1ae4538691e8e5eb171a8b4878564ae196d4dc6460a60b31e690382e898d5cec2420e1880d3ca22b79f5a3a730cbe945d995dc38fefe394156d6a18e64c0bf194fba4e6885b898a04a6957d633e4b1dbe134dbe3fbd739a7b54790cd73f7febb45489998397b45dde4dbe243b88a983a04c2df7d45e67e51459c29d758f0842f90f8e25d0d3625e69a97b1f9a3dbb3f836dada2f09781b0b78e8e3f73b340ada5a9b4549c0783b5d3fab4b9d916b13ee0f0b77016d54d4dc35d524ed58d0987a66864e18f866a2d87a1e5895cd0c0e8e070643e6a78b954517cd611ea4e59efc0a575a0caf4fd000b35b16df9a0d4070ddbf76ba8ce6d2f20eca6d23c0754307b1ce3240d2b15a4fd63a23a99b3c28c887c973926ade55351b361e6c9fd6294ae135f57d4c9ae435b86a05fddf262e2703340a2531f86d55ba583bbae029053eed09ef8dc4672752a29a9edb83e244c3f7155fd1c3e28b48831cef19419b94038825b22e96d514de77c3164835c92b5bf9a85a29aab86fd4a4092c6bf9c347eb145ee7cd6026413aab5bf203c84a58b318631cdb94a4248a7c2e27b99bed82ae0a2f59db3ff5e81cf28ecb32ff878cb5c4bd571c64b28ffd105d8ae9fa6286c4d607796b38042d3c672703f40473e00733c201fa44140646d6e89e58bab28e900f4986a12d6849d82bec7086a1842551ac11529ec8a63ed950f5ff5c1be02dd3f7072fad0d70002239ca8b7e99e5d0f4094dd153b9cafc54d49b81e94e1347089b3bc059060e4c777aecf8ffe84d602fdb1cc24c1241e3120997414b3f04c76c7ddf46fa50e7a946f658df857c5e7a8f8f947c534c8cb52153b4a55e63d8015fb85aabe1baa9dda2631e55577f8c7d3ae8648a22c49206fb6ebfe1afc592b55f8cdb3057664cd3e9da47a05d37e3192180e097e6cb9967a8015cda66c48753986d66db92942d446ef3d3f46bae5dc973e2d60355b279ad9d64835c3f2afe32d1fe6e559097aa8064c902a1336482ac8b97a574cf41a65562d890fe5ce4889370f0261f0f206a0a90de98d232347eaab57ad97880194873c2c10fe3bbcaac6e7ffcf15b2306f3f37e749c9380b72fce3cef6e088cf1d24c35f75ea7d44f3260478a4756c9ca5ca366633d215ef54c915e1eef1277d4ab435444ec0b9de577396a873519719bf242967d2076db488f85951be489d3e123d9b801637ca00acf562c5dc1d55f1496dc8b5b775e408a9c9089292bed06c01feee8e8817af53d98d76e70ddd1c6cdb8c7cf6574adc0c5f3c9b8938700625fd3a29e32060290763d12062b707e5c4de2fc1a4290285e49094b5abdbd38af751f75d77be2ed35f7425141a9a504aa2ac74825507adb91f8564a3c7a4897f059078f247de57e9b06bc7db0ea7f72d4e582e100beda94c6a74d3bbbe41d01b3a344e476cef6527e1fc71cb4e4d4b4a885f16566418c42e3434752233d541dbfd596f113cc0f769df33df4a43468c940811f1eb36cfb52bc483f39a4098c41aaedc0937a5ef195ec0173ec909795904fe01e836f40c562ad220ad8e57be9c3e217dadba39c6c7c92cb76537cac4b819753e14603729cd21685dbb36f7a2f159f1a00fba116dd50ac53d1953bb4e974f3050c9769d5d18163329db8a28b3319f418a0dac166a6cfecc58d504787ea71515a091a98e7119b7efef0cca1aaa7c3bae903044fcee7fe9c264a6903a569aef35942c1d8e5d14a5cc2747d49b633c7c93c31c2a6d5421aa134bda5d717baaffe4d3ce1597c2e32a67e2fddfea172563e7e5d2ae25d8931694e0ae5a912cfaf95e0f7a3e84ab351f0cbd94b0f9ae82a6712339ec9f9adbb7dd18619508192e4a56a560bba167d42eb109fb98c59b9280af6e681e7445b584734eba039ca189b6204e86172132133ca5abc39576a0015a98853d1447f34713d49808ad5e6d70cdae60b4940402ffd23c299b342daa4d8836990274d622a612148e6133da6d0f8dfebbd776ede482c45e8e52fa42ad761499e4860ec45d17f66da7c084fd7a4b4b5f66b3747f1dd82186c5b226c3c11be627533b12bfc63b1a64e452d2a638ff6e851b59e6fb72d287928c6d3822f82606f13483baa6a60c677e599d2fe17980a8581f3f1282b7302e0950e66495e182cffc1efcb136f7eceb8e39036096f1fcea4216a776d8285e78a72995593665b6f24b556cf2fcb37f959332d2ae4a49f92553e6a58ff44c53fb3c42bb2939919834dacf98a79af950849a79e50a40bcc9e1d9dd7f730b1e911ff8470979446dbdc3eb6f95f2078659f538177611e2c2eb8abaafdba22c0b217c474abb3c829f496e261d71f155fc6bde051b73de7aba3f569a288438438b4d6b950728a2cc9f87bd6a07f37d66064343dc9c585b749bb27416811b7b1a1b87ea171b3518429ab86cc80c20ec3a46e604d8ecfc7cea7cda91253cb3723b8de7a4771f1a49749791f10f94d56a53d17c98c5abe02887ba475757baaa2018bebc40915ae4c5e21319c13365cc557ceeb5fd87de545fe23df6976f8dc88b234fafdbda9b031d0b132dab7a735aa465571120dc4eb9cfb0d154eb877773fa5010594cbcdb066e1187c68ce96f1013e315f76646179f2ca4e4917d07a9e42f697e23b8679858cf216620b0c7ac8ba44c9e352600a6a19aa53e661bd366ad1a9e3da566b3ccc76fc065695cadf39b7b3c08c2fe94a9dfc355b1e99f1486d81358292b1de801b4387a0d3aeec40246f97ef910c1b94f0bc5435555a70cf11e15af7943e9ee9f31cffc76f54afa5495626e622e5c8320c89385b36866cd7da125ef3919222d74212a273804112a27b08a95e19ffc32d953f5b684258fade60bc34fd695db2717a622d6fecfe03bdec96f7d30b52ae752dfe2402e5e7827e7d94c73540f3cc239051820fe231deaaaa088515e6913bf2d6da9560a81b2c6d359561638dfa4ad4a87dcc8d6d7451f0a3219a05d78d7a65a0ae7e791301eac288293ca134400b72d7b350d26b38d9b035a1a27556ab2f16af9efc11e5062c76f2364cdaa16dc4f9500d8005c31b1703f59aace1ed23998867b12b8b98bbc4253828fc79003ff404fd21955eee6c46eac2d730ca9aec597ce0cf4f543ee14cc4376521810190808c2c94f3200194116a2e4269b096e7b0064b01491e700b0f9d6f7c26e8fde76a73e5c4b33ce218e833f6ff7215b181f3da1539be4678e9e39af60f416e24c34045b7b20943d429097a16471ca931971787f721abd8873e5625759e38a051acc451c6a217cf89a278548d314935959e829bfb6f094fb8f495a9e1ddb153902e133da76e241e8fc90479c3ead2793d0a4508d730f960f2e2f00ca2a4ad85d9d0a328a20edfb01536383797efe818011cbdf0b8d5d7204be231b648f7e6ad630444df4880402eec9cbd5221389bbdfcbf32b0865b0a95448b829e43aa9ba276b8e149ef48c997e46742c536666a5bff74917e07c77fde66bed6d53dc97f13061155eef9e2d5a15f3b6c058e8c2f14d3619afaa5d6f8e981ceca7c4bc8263416f2248c8d47079fa43aea4955134ca318e72208702b2fd1c6e35155c52c8204d790121f2dacda91f5652a080a8dfed26a306830f21bf75eae54e81b6b614ea0d7c0710a94f6f90b3d36d3af8bac746b9629eed0eb0f0d4e45e68a4276dc34dac7b875c4ae9de28980cb9710a29b2bdb43635bb87d02d666777a977525f8e83bc6ff7bbf7af490d65f06a0eca39a87a8d87845c126c601b597a7a4a5dc6f25390bdd404e423ad5b9622a9cdbbece0dcd3eaf072ba9edf0e84a0909f2e782ac19a83783eb2e42e87819a68c25bfedb0633ff11e81e86dc1eca9cf29daee6317ae9bfae7792158a9eb17407f1c86e03ec5be2538057de604cab78bb25e4bcb56d082985afb0825dcbbf4a8c2c006e8aa1357a08a8c3db8d2905b78602272419c4cd31cfc2f3a058a0e3e1dde243d05f71ce1310cf2de6cf109833229617d3c0ef062facc84d5e53c08e2bfcf065dc521d59897c6cc1bee0569163cd4331ba2857243009dd4959e3bff673e2a7141e8f1e66ccb929afe6ce45b6364669d2fe3f950ae83a9137a7646ba9f70f4adbc329219d2ee7772e116dd1804a53c167adc4ad955acca1c733e958b681ffc21e71594bad78e693bbd5b8a9eadf7c47eb97021adfb51dcae89de0c70b14e72cdddc9fbe923ed406b1c17b3eb5b09b32eda5d638a33d319c080b81dd722d206c1cad68b28bb49fba04f0888e5dd48f6b8046d8d91da03048095be14e16764edd386d779538fc558e15612bb21377737166a928b20dc38ea69c50750b7079e4da698dc9d8bc1748af3f6a9e3f0cd04f31", 0x1000, 0x8001, 0x0, 0x432459414d76e6ad, r9}]) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:31 executing program 4: r0 = socket(0x0, 0x0, 0x0) mkdir(&(0x7f0000000000)='./file0\x00', 0x0) getsockname(r0, &(0x7f00000001c0)=@rc, 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x200000000000013, 0x0, 0x0) connect$inet6(r2, &(0x7f0000000000)={0xa, 0xfffe, 0x0, @rand_addr="00008000"}, 0x1c) fcntl$dupfd(0xffffffffffffffff, 0x0, r2) fcntl$setstatus(r2, 0x4, 0x80000000002400) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x200000000000013, &(0x7f0000000040)=0x480100000001, 0x4) connect$inet6(r3, &(0x7f0000000000), 0x1c) setsockopt$inet6_tcp_TCP_REPAIR_OPTIONS(r3, 0x6, 0x16, &(0x7f0000000440), 0x12f7e5) r4 = fcntl$dupfd(r3, 0x0, r3) setsockopt$inet_opts(r4, 0x0, 0x4, &(0x7f0000000140)="d0d616daf7c0bc46df2ebadd72b786229ae8022d0ed379999789f4f5748d178b48c67083e9b6eb314d", 0x29) ioctl$sock_TIOCINQ(r1, 0x541b, &(0x7f0000000340)) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000002c0), 0xd}, 0x0, 0x2, 0xfffffffe, 0x3, 0xfffffffffffffffc, 0xfffffffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') socket$netlink(0x10, 0x3, 0x0) unshare(0x40000000) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000180)='stat\x00') perf_event_open(&(0x7f000001d000)={0x1, 0xfffffffffffffdec, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) r5 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_mtu(r5, 0x0, 0xa, &(0x7f0000000240)=0x3, 0x4) ioctl$TIOCMBIS(0xffffffffffffffff, 0x5416, &(0x7f0000000080)=0x9) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000380)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r6, 0x8923, &(0x7f0000000200)={'ip_vti0\x00', 0x3001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0xfc, 0x3, 0x2, 0x0, 0x0, 0x365c, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 23:15:31 executing program 5: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) creat(&(0x7f0000000200)='./file0\x00', 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x81800) ioctl$sock_inet_SIOCSIFPFLAGS(r3, 0x8934, &(0x7f0000000340)={'nlmon0\x00', 0x80}) r4 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0xffffffffffffff61) ioctl$UI_SET_EVBIT(r1, 0x40045564, 0x12) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r5, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r5, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = syz_genetlink_get_family_id$tipc(&(0x7f0000000100)='TIPC\x00') sendmsg$TIPC_CMD_RESET_LINK_STATS(r8, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2040}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB, @ANYRES16=r9, @ANYBLOB="00012cbd7000fcdbdf2501000000000000000c410000000c001473797a3100000000"], 0x28}, 0x1, 0x0, 0x0, 0x8000}, 0xff9c6471821b0643) recvfrom(r6, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:31 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r2 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:31 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:31 executing program 0: syz_mount_image$ext4(&(0x7f0000000080)='ext4\x00', &(0x7f0000000000)='./file0\x00', 0x0, 0x1, &(0x7f0000000280)=[{&(0x7f00000000c0)="800000003804000019000300e60100006c000000000000040000000001000000004000000040010080002e360e59acaa4f37be5a0000ffff53ef", 0x3a, 0x400}], 0x0, 0x0) r0 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000300)='/proc/self/net/pfkey\x00', 0xa001, 0x0) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f00000000c0)={{{@in=@multicast2, @in6=@mcast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@dev}, 0x0, @in=@multicast1}}, &(0x7f00000001c0)=0xe8) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000200)={@mcast1, 0x4, r1}) r2 = open(&(0x7f0000000040)='./file0\x00', 0x200c2, 0x0) write$nbd(r2, &(0x7f0000000380)=ANY=[@ANYBLOB="6744669800000000fcff0100000000006517a42ac4cb7a63d1a97a7e6d06589e03469637a7267592938766010a35efd29affe2009efdc31a381587a53c0d00000000000003e9e841e84f03d05ebc7e87c10dfc8b2cf1fd86fbcd578bcd3e51a594acdea573d84d62215d3e9e1c3ce9db868d4ee3bc0b06f8865611d9538c84c6c1a8cf8d285e16eb145b21e78390c268b4919ba00c2f81d8ebc88648aec9dafb2c6f66943bc0347fc1aa918f1383e456de840a334085ee5ad56dbd8d027120d49deb92c530d75197d928a5f717d65887ff134d67670425"], 0x74) sendfile(r2, r2, &(0x7f0000000200), 0xa198) r3 = syz_genetlink_get_family_id$team(&(0x7f00000007c0)='team\x00') r4 = socket(0x100000000011, 0x2, 0x0) getsockname$packet(r4, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r6 = socket(0x100000000011, 0x2, 0x0) bind(r6, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r6, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) r8 = socket$packet(0x11, 0x20000000000003, 0x300) ioctl$sock_SIOCGIFINDEX(r8, 0x8933, &(0x7f0000000180)={'lo\x00\x00\x00\x00\x02\x00', 0x0}) setsockopt$packet_add_memb(r8, 0x107, 0x1, &(0x7f0000000080)={r9, 0x1, 0x6, @broadcast}, 0x17) r10 = socket(0x100000000011, 0x2, 0x0) bind(r10, &(0x7f0000000140)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0xfffffffffffffebf) setsockopt$packet_drop_memb(r8, 0x107, 0x2, &(0x7f0000000000)={r11, 0x1, 0x6, @remote}, 0x10) getsockname$packet(0xffffffffffffffff, &(0x7f0000000040)={0x11, 0x0, 0x0}, &(0x7f00000000c0)=0x14) sendmsg$TEAM_CMD_OPTIONS_SET(r2, &(0x7f0000000ec0)={&(0x7f0000000780)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000e80)={&(0x7f0000001340)=ANY=[@ANYRES16=r5, @ANYRES16=r3, @ANYBLOB="000800000000fbdbdf250100000008000100", @ANYRES32=r5, @ANYBLOB="0400020008000100", @ANYRES32=0x0, @ANYBLOB="440102003c00010024000100656e61626c65640000000000000000000000000000000000000000000000000008000300060000000100040008000600", @ANYRES32=r7, @ANYBLOB="3800010024000100616374697665706f727400000000000000000000000000000000000000000000080003000300000008000400", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000900000008000600", @ANYRES32=0x0, @ANYBLOB="40000100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000700000002000600", @ANYRES32=0x0, @ANYRES16, @ANYRES32=0x0, @ANYBLOB="640102007767c70cb2a465e0432f323c00010024000100656e61926c65640000000000000000000000000000000000000000000000000008000100060000000400040008000600", @ANYRES32=0x0, @ANYBLOB="38000100240001006e6f746966795f70656572735f636f756e740000000000000000000000000000080003000300000008000400850000003c00010024000100757365725f6c696e6b7570000000000000000000000000000000000000000000bc860300060000000400040008000600", @ANYRES32=r11, @ANYBLOB="40000100240001007072696f7269747900000000000000000004000000000008a000000001800000080003000e00000008000400ffff000008000600", @ANYRES32=r1, @ANYBLOB="38000100240001006c625f73746174735f726566726573685f696e74657276616c000000000000000800030003000000080004000600000038000100240001006d636173745f72656a6f696e5f696e74657276616c0000000000000000000000080003000300000008000400e9f2000008000100", @ANYRES32=0x0, @ANYBLOB="d000020085ff0100240001006c625f706f72745f737461747300000000000000000000000000000000000000080003000b000000080004000100000008000600", @ANYRES32=r12, @ANYBLOB="4c000100240001006c625f74785f6d6574686f64000000000000000000000000000000000000000008000300050000001c000400686173685f746f5f706f72745f6d617070696e670000000040000100240001006c625f74785f686173685f746f5f706f72745f6d617070696e67000000000000080003000300000008000400", @ANYRES32=r1, @ANYBLOB='\b\x00\a\x00\x00\x00\x00\x00'], 0x1d}, 0x1, 0x0, 0x0, 0x60018981}, 0x4048060) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r14 = dup(r13) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) getsockopt$inet_mreqn(r14, 0x0, 0x23, &(0x7f0000000380)={@remote, @rand_addr, 0x0}, &(0x7f00000003c0)=0xc) r16 = socket$nl_route(0x10, 0x3, 0x0) r17 = socket(0x11, 0x800000003, 0x0) bind(r17, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r17, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r16, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r18, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r18, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000400)={'netpci0\x00', 0x0}) accept$packet(0xffffffffffffffff, &(0x7f0000000440)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000480)=0x14) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, &(0x7f00000004c0)={'team0\x00', 0x0}) r22 = socket(0x100000000018, 0x0, 0x4) connect(r22, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) ioctl$ifreq_SIOCGIFINDEX_team(r22, 0x8933, &(0x7f0000000500)={'team0\x00', 0x0}) r24 = socket$nl_route(0x10, 0x3, 0x0) r25 = socket(0x11, 0x800000003, 0x0) bind(r25, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r25, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r24, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r26, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r26, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) getsockname(0xffffffffffffffff, &(0x7f0000000540)=@hci={0x1f, 0x0}, &(0x7f00000005c0)=0x80) r28 = socket(0x100000000018, 0x0, 0x4) connect(r28, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) getsockname$packet(r28, &(0x7f00000006c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000700)=0x14) r30 = socket$nl_route(0x10, 0x3, 0x0) r31 = socket(0x11, 0x800000003, 0x0) bind(r31, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r31, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r30, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r32, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r32, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r33 = socket$nl_route(0x10, 0x3, 0x0) r34 = socket(0x11, 0x800000003, 0x0) bind(r34, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r34, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r33, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r35, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r35, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r36 = socket$nl_route(0x10, 0x3, 0x0) r37 = socket(0x11, 0x800000003, 0x0) bind(r37, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r37, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r36, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r38, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r38, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r39 = socket$nl_route(0x10, 0x3, 0x0) r40 = socket(0x11, 0x800000003, 0x0) bind(r40, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r40, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r39, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r41, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r41, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r42 = socket$nl_route(0x10, 0x3, 0x0) r43 = socket(0x11, 0x800000003, 0x0) bind(r43, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r43, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r42, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r44, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r44, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) r45 = socket(0x100000000018, 0x0, 0x4) connect(r45, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) getsockopt$inet_IP_XFRM_POLICY(r45, 0x0, 0x11, &(0x7f0000000740)={{{@in=@local, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in6=@ipv4={[], [], @empty}}}, &(0x7f0000000840)=0xe8) r47 = socket$nl_route(0x10, 0x3, 0x0) r48 = socket(0x11, 0x800000003, 0x0) bind(r48, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r48, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r47, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r49, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r49, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000880)={'veth0\x00', r49}) r51 = socket(0x100000000018, 0x0, 0x4) connect(r51, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) accept$packet(r51, &(0x7f00000008c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f0000000900)=0x14) r53 = socket$nl_route(0x10, 0x3, 0x0) r54 = socket(0x11, 0x800000003, 0x0) bind(r54, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r54, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) sendmsg$nl_route_sched(r53, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000400)=ANY=[@ANYBLOB="480000002400e577a885ddb05cc582f24186cf0d", @ANYRES32=r55, @ANYBLOB="00000000ffffffff0000000008000100687462001c00020018000200030000001afaffffff0000000000"], 0x48}}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=@getchain={0x30, 0x66, 0x800, 0x70bd29, 0x25dfdbff, {0x0, 0x0, 0x0, r55, {0xfff1, 0x2}, {0x2, 0xffe0}}, [{0x8, 0xb, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) sendmsg$TEAM_CMD_OPTIONS_GET(r0, &(0x7f0000001200)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f00000011c0)={&(0x7f0000000940)={0x848, r3, 0x2, 0x70bd29, 0x25dfdbfe, {}, [{{0x8, 0x1, r15}, {0x244, 0x2, [{0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r18}}, {0x8}}}, {0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0x2}}, {0x8, 0x6, r19}}}, {0x40, 0x1, @priority={{{0x24, 0x1, 'priority\x00'}, {0x8}, {0x8, 0x4, 0xc3}}, {0x8, 0x6, r20}}}, {0x5c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x2c, 0x4, [{0x80, 0x5, 0x9, 0x81}, {0x20, 0x2, 0xb6, 0x4}, {0xfff9, 0x2, 0x17, 0x200}, {0x8, 0xfd, 0x81, 0x1}, {0x3, 0x12, 0x1f, 0x200}]}}}, {0x38, 0x1, @notify_peers_interval={{0x24, 0x1, 'notify_peers_interval\x00'}, {0x8}, {0x8, 0x4, 0x81}}}, {0x40, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x10, 0x4, 'broadcast\x00'}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x2}}}, {0x38, 0x1, @lb_stats_refresh_interval={{0x24, 0x1, 'lb_stats_refresh_interval\x00'}, {0x8}, {0x8, 0x4, 0x800}}}]}}, {{0x8, 0x1, r21}, {0x1b0, 0x2, [{0x3c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0xc, 0x4, 'hash\x00'}}}, {0x4c, 0x1, @lb_tx_method={{0x24, 0x1, 'lb_tx_method\x00'}, {0x8}, {0x1c, 0x4, 'hash_to_port_mapping\x00'}}}, {0x38, 0x1, @notify_peers_count={{0x24, 0x1, 'notify_peers_count\x00'}, {0x8}, {0x8, 0x4, 0x7fff}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x9}}}, {0x38, 0x1, @mcast_rejoin_interval={{0x24, 0x1, 'mcast_rejoin_interval\x00'}, {0x8}, {0x8, 0x4, 0x20}}}, {0x40, 0x1, @lb_hash_stats={{{0x24, 0x1, 'lb_hash_stats\x00'}, {0x8}, {0x8, 0x4, 0x10000}}, {0x8}}}, {0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r23}}}]}}, {{0x8, 0x1, r26}, {0x40, 0x2, [{0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r27}}}]}}, {{0x8, 0x1, r29}, {0x19c, 0x2, [{0x38, 0x1, @activeport={{0x24, 0x1, 'activeport\x00'}, {0x8}, {0x8, 0x4, r32}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r35}}, {0x8}}}, {0x40, 0x1, @lb_tx_hash_to_port_mapping={{{0x24, 0x1, 'lb_tx_hash_to_port_mapping\x00'}, {0x8}, {0x8, 0x4, r38}}, {0x8}}}, {0x6c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x3c, 0x4, [{0x2858, 0x4, 0x2, 0x10000}, {0x8001, 0x0, 0x1f, 0x5}, {0x0, 0x9, 0x6, 0x2}, {0x5, 0x4f}, {0x4, 0x7f, 0x2, 0x6}, {0x1d3d, 0x7, 0x0, 0x4e8}, {0x401, 0xba, 0x20, 0x3}]}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x34}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8}}}]}}, {{0x8, 0x1, r41}, {0x108, 0x2, [{0x44, 0x1, @name={{0x24, 0x1, 'mode\x00'}, {0x8}, {0x14, 0x4, 'activebackup\x00'}}}, {0x3c, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0xc, 0x4, [{0xff77, 0x84, 0x0, 0x5}]}}}, {0x84, 0x1, @bpf_hash_func={{0x24, 0x1, 'bpf_hash_func\x00'}, {0x8}, {0x54, 0x4, [{0x5, 0x1f, 0x2}, {0x5, 0xf7, 0x82, 0x200}, {0x5375, 0x3, 0x6, 0x8001}, {0x9, 0x40, 0x20, 0xfe14}, {0x9, 0x81, 0xa1, 0x9}, {0x800, 0x5, 0x9, 0x4}, {0x5, 0x3, 0x51, 0xe00000}, {0x4, 0x0, 0xc0, 0x7fffffff}, {0x3, 0x7, 0x6}, {0xff, 0x0, 0xdb, 0x7}]}}}]}}, {{0x8, 0x1, r44}, {0x12c, 0x2, [{0x3c, 0x1, @user_linkup_enabled={{{0x24, 0x1, 'user_linkup_enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r46}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r50}}}, {0x38, 0x1, @mcast_rejoin_count={{0x24, 0x1, 'mcast_rejoin_count\x00'}, {0x8}, {0x8, 0x4, 0x8a35}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r52}}}, {0x3c, 0x1, @enabled={{{0x24, 0x1, 'enabled\x00'}, {0x8}, {0x4}}, {0x8, 0x6, r55}}}]}}]}, 0x848}, 0x1, 0x0, 0x0, 0x4800}, 0x1) 23:15:31 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) [ 493.978191] EXT4-fs (loop0): invalid inodes per group: 16384 [ 493.978191] [ 494.010314] device lo entered promiscuous mode [ 494.143354] device lo left promiscuous mode 23:15:31 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(0xffffffffffffffff, &(0x7f0000000000)=ANY=[], 0x0) prctl$PR_SET_TSC(0x1a, 0x2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) recvfrom(0xffffffffffffffff, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:31 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) pipe2(&(0x7f0000000100)={0xffffffffffffffff}, 0x40000) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000140)={0x10}) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) ioctl$TIOCSISO7816(r5, 0xc0285443, &(0x7f0000000000)={0x1ff, 0x200, 0x86800000, 0x5, 0x7fff}) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) [ 494.480515] EXT4-fs (loop0): invalid inodes per group: 16384 [ 494.480515] [ 494.540117] device lo entered promiscuous mode [ 494.613396] device lo left promiscuous mode 23:15:32 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0xfffffffffffffecd) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x100, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:32 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c02) 23:15:32 executing program 0: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r0) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd3, &(0x7f0000000000), 0x3c) socket$inet(0x2, 0x2000000000003, 0x2) 23:15:32 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) dup2(r0, r1) 23:15:32 executing program 4: mknod$loop(0x0, 0x0, 0xffffffffffffffff) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r2 = socket$unix(0x1, 0x2, 0x0) connect$unix(r2, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) connect$unix(r0, &(0x7f0000000400)=ANY=[@ANYRESOCT, @ANYPTR64, @ANYBLOB], 0x3) 23:15:32 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:32 executing program 0: r0 = socket$inet6(0xa, 0x80003, 0x6b) syz_emit_ethernet(0x0, 0x0, 0x0) ioctl(r0, 0x1000008912, &(0x7f00000001c0)="0815b5055e0bcfe87b3071") socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet_icmp_raw(0x2, 0x3, 0x1) syz_emit_ethernet(0x32, &(0x7f0000000100)={@local, @dev, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x24, 0x0, 0x0, 0x0, 0x1, 0x0, @rand_addr, @multicast1}, @dccp={{0x4e23, 0x0, 0x4, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, "4df1c8", 0x0, "f8aefc"}}}}}}, 0x0) 23:15:32 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:32 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) timer_getoverrun(0x0) 23:15:36 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc65, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) memfd_create(&(0x7f0000000080)='/dev/aut*Sofs\x00', 0x0) 23:15:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:36 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:36 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = socket$netlink(0x10, 0x3, 0x8000000004) writev(r6, &(0x7f0000000000)=[{&(0x7f0000000180)="580000001400add427323b470c45b4560a067fffffff81004e22000d00ff0028925aa80020007b00090080000efffeffe809000000ff0000f03ac71082300000ffffffffffffffffffe7ee00000000000000000200000000", 0x58}], 0x1) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r8 = syz_genetlink_get_family_id$devlink(&(0x7f0000000140)='devlink\x00') readlinkat(r7, &(0x7f0000001540)='./file0\x00', &(0x7f0000001580)=""/114, 0x72) r9 = open(&(0x7f0000000240)='./file0\x00', 0xa00, 0x10) sendmsg$DEVLINK_CMD_RELOAD(r7, &(0x7f0000001500)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x102000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001440)={0x3c, r8, 0x900, 0x70bd25, 0x25dfdbfd, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x89, r9}}]}, 0x3c}, 0x1, 0x0, 0x0, 0x10000}, 0x55d5dee153a446a7) sendmsg$DEVLINK_CMD_RELOAD(r6, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x41000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x38, r8, 0x800, 0x70bd2c, 0x25dfdbfe, {}, [{@pci={{0x8, 0x1, 'pci\x00'}, {0x14, 0x2, '0000:00:10.0\x00'}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8b, 0x3}}]}, 0x38}, 0x1, 0x0, 0x0, 0x20004050}, 0x800) r10 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r10, r10, 0x0, 0x8800000) r11 = fcntl$getown(r10, 0x9) sendmsg$DEVLINK_CMD_RELOAD(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0xa000000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x3c, r8, 0x210, 0x70bd25, 0x25dfdbff, {}, [{@nsim={{0x10, 0x1, 'netdevsim\x00'}, {0x10, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8a, r11}}]}, 0x3c}, 0x1, 0x0, 0x0, 0xad61dfb68f97ea01}, 0x4) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:36 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) write$binfmt_elf64(r0, &(0x7f0000000400)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYPTR=&(0x7f0000000100)=ANY=[@ANYPTR, @ANYPTR64, @ANYBLOB="38d8b14650cef36ddcfad93409dd54229fd41f616433401d649446a543334db31c89db1c0a0a42650636e25312205b26395156709de935de186f4ae5ab7406df5edb0b1fc34a38c61220e6a679"], @ANYRES64, @ANYPTR64=&(0x7f0000000180)=ANY=[@ANYPTR, @ANYRESHEX, @ANYRESHEX, @ANYPTR64, @ANYRES64, @ANYPTR64, @ANYRESHEX, @ANYBLOB="93b3990e1ae772a12ea47c1bb571df3f8bea8a0d97bb778a571321c9f7b4c09524aeee1d844a3cf74dae1c2a73122950042c5c01f6c870e9fc2243dff0551f74072391a079337453a4fcfe20366d9d8fa67656b6864cc53fd17c65e33b661376000fb9f4ecc81a71d795e336fc7e458d2198c0cf7595f5703b96fea2bd6e75675bd7a5d80ba70c2db9087c1e118088d491f934b0913004b740d7aeaa013d6a355809553aadac4f6baab263af9603410e4d1666ad4ebfb0c4ce18f984507efbe9aed1b730ef38a0b44716fbba921f482c404bcb7e8f46333eef5ed1485a7e596e863d", @ANYRESHEX, @ANYRES32], @ANYRES32=r2, @ANYRESDEC=r0, @ANYPTR64=&(0x7f0000000300)=ANY=[@ANYRES64, @ANYBLOB="edb889ecacd3bd7d25b6da58ac9875291915d5baea32ff793a069e5fe620b04923be3adce18e0a469844c071fb6820afc1fe4a1a7d5a14479411245e8acc724dbf3f"]], @ANYPTR64=&(0x7f00000003c0)=ANY=[@ANYRESOCT=r3]], 0x10) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r4 = socket(0x100000000018, 0x0, 0x4) connect(r4, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) accept4$inet(r4, &(0x7f0000000480)={0x2, 0x0, @multicast2}, &(0x7f00000004c0)=0x10, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:36 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:36 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:36 executing program 0: recvmmsg(0xffffffffffffffff, &(0x7f0000008880), 0x400000000000249, 0x0, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$evdev(&(0x7f0000000140)='/dev/input/event#\x00', 0x0, 0x29021) r2 = dup3(r0, 0xffffffffffffffff, 0x40000) ioctl$PIO_UNIMAPCLR(r2, 0x4b68, &(0x7f0000000000)={0x3ff, 0x9, 0x6}) write$evdev(r1, &(0x7f0000000040)=[{{0x77359400}}], 0xfdda) 23:15:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:36 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) [ 499.302028] selinux_nlmsg_perm: 70 callbacks suppressed [ 499.302037] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=27206 comm=syz-executor.3 23:15:36 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:36 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) 23:15:36 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) 23:15:36 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) 23:15:36 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x42, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) timer_create(0x0, &(0x7f0000cd0000)={0x0, 0x12, 0x0, @thr={0x0, 0x0}}, &(0x7f0000000040)) timer_settime(0x0, 0x0, &(0x7f00000001c0)={{0x77359400}, {0x0, 0x989680}}, 0x0) r0 = gettid() tkill(r0, 0x1000000000016) [ 499.673144] SELinux: unrecognized netlink message: protocol=4 nlmsg_type=0 sclass=netlink_tcpdiag_socket pig=27213 comm=syz-executor.3 23:15:37 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:37 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ioctl$EVIOCRMFF(0xffffffffffffffff, 0x40044581, &(0x7f0000000000)=0x7) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:37 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:37 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000140)=[{0x200000000006, 0x0, 0x0, 0xfffffffb}]}) faccessat(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:15:37 executing program 3: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = perf_event_open$cgroup(&(0x7f0000000100)={0x1, 0x70, 0x4, 0xe2, 0x80, 0xba, 0x0, 0x7, 0x10004, 0x917c53f7a8002663, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0xd3a2947753d1987f, @perf_config_ext={0x0, 0x5}, 0x0, 0x2, 0x7, 0x2, 0x6, 0x1, 0x6}, 0xffffffffffffffff, 0xc, r1, 0x8) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8, 0x0, 0x6}, 0x0, 0x0, r2, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r3, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r3, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r4, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:37 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:37 executing program 0: r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f00000006c0)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) setuid(0xee01) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) 23:15:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r0}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000080)='/dev/aut*Sofs\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) 23:15:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:41 executing program 5: fallocate(0xffffffffffffffff, 0x1, 0x0, 0xfffffffffffffffc) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) syz_open_procfs(r2, &(0x7f0000000100)='auxv\x00') ptrace$cont(0x7, r2, 0x0, 0x0) syz_open_procfs(r2, &(0x7f0000000000)='net/unix\x00') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:41 executing program 3: r0 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f0000000040)='/selinux/avc/hash_stats\x00', 0x0, 0x0) perf_event_open(&(0x7f000001d000)={0x8e29c2df1b13ab94, 0x70, 0x6, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10, 0xf8ae826ec4903202, @perf_bp={0x0, 0x9}, 0x0, 0x0, 0xffffffff, 0x4, 0x4}, 0x0, 0x0, r0, 0x9) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) pwrite64(r4, &(0x7f0000000100)="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", 0xff, 0x7) chdir(&(0x7f0000000000)='./file0\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r3, &(0x7f0000000280)=""/184, 0xb8, 0x2200, 0x0, 0x0) 23:15:41 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:41 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$selinux_status(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/status\x00', 0x0, 0x0) ioctl$FS_IOC_RESVSP(r0, 0x40305828, &(0x7f0000000100)={0x0, 0x2, 0x1, 0x7}) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:41 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r0}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:41 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x365f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdir(&(0x7f0000fd5ff8)='./file0\x00', 0x0) mount(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000440)='proc\x00', 0x0, 0x0) r0 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000005c0)=""/223, 0xfc61) gettid() getsockopt$inet6_IPV6_XFRM_POLICY(0xffffffffffffffff, 0x29, 0x23, 0x0, &(0x7f0000000400)) memfd_create(&(0x7f0000000080)='/dev/aut*Sofs\x00', 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$netlink_NETLINK_CAP_ACK(0xffffffffffffffff, 0x10e, 0xa, 0x0, 0x0) 23:15:41 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:41 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:41 executing program 0: 23:15:41 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:41 executing program 0: 23:15:42 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:42 executing program 4: syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:42 executing program 0: 23:15:42 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) ioctl$UI_GET_SYSNAME(0xffffffffffffffff, 0x8040552c, &(0x7f0000000340)) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r4}}, {@uid_lt={'uid<', r5}}, {@smackfstransmute={'smackfstransmute'}}]}) r6 = socket$inet6(0xa, 0x3, 0x87) connect$inet6(r6, &(0x7f0000000180)={0xa, 0x0, 0x0, @remote, 0x80}, 0x1c) r7 = perf_event_open(&(0x7f00000001c0)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5253a966ef325efe, @perf_config_ext={0x3778, 0x5f2}, 0x0, 0x0, 0x3, 0x0, 0x200000004000007, 0x1}, 0x0, 0x6, 0xffffffffffffffff, 0x4) keyctl$KEYCTL_PKEY_QUERY(0x18, 0x0, 0x0, &(0x7f00000002c0)='fowner>', &(0x7f0000000300)) r8 = dup2(r6, r7) r9 = getegid() ioctl$TUNSETGROUP(r8, 0x400454ce, r9) getgroups(0x7, &(0x7f00000004c0)=[0x0, 0xee00, 0xee01, 0xffffffffffffffff, r9, 0x0, 0x0]) mount$fuse(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000100)='fuse\x00', 0x2050, &(0x7f0000000140)={{'fd', 0x3d, r3}, 0x2c, {'rootmode', 0x3d, 0xc000}, 0x2c, {'user_id', 0x3d, r4}, 0x2c, {'group_id', 0x3d, r9}, 0x2c, {[], [{@rootcontext={'rootcontext', 0x3d, 'root'}}, {@hash='hash'}, {@fscontext={'fscontext', 0x3d, 'root'}}, {@measure='measure'}, {@dont_measure='dont_measure'}]}}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r11 = dup(r10) ioctl$PERF_EVENT_IOC_ENABLE(r11, 0x8912, 0x400200) ioctl$ASHMEM_SET_SIZE(r11, 0x40087703, 0x5) r12 = openat$uhid(0xffffffffffffff9c, &(0x7f0000000380)='/dev/uhid\x00', 0x802, 0x0) write$UHID_INPUT2(r12, &(0x7f0000000580)={0xc, 0x5f, "f3b16f420cc26f87b35efe0beea2837234e1480de3e705c43ce07a9068b1086f030dd9ac1b264780f0f9cfad367205e29257f93528711f5a87d3057af292d3bc6853a4cfdf989c77b3499ed32680ca19a54187b53cc3a80e1caa441d10c490"}, 0x65) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:46 executing program 0: 23:15:46 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:46 executing program 3: r0 = accept$inet6(0xffffffffffffffff, &(0x7f00000002c0), &(0x7f0000000400)=0x1c) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f00000006c0)={0x1, 0x3, 0x1000, 0x51, &(0x7f0000000480)="24f49d3cc36ce0f0150165be424f57c79b9c912173e2d4a53538a9e10890ddda71be4b9268eb6ad227a683ef9c2187f0addb8862c6838e87036f3a0615bcdd648136eefba3a6bd5be901ee2f549102ab6c", 0x1d, 0x0, &(0x7f0000000500)="c232a3c832333cda64b747217f47bf7affdb55abbd5241b8aaa02a405e"}) perf_event_open(&(0x7f0000000140)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x20000, 0x0, 0x0, 0x0, 0x753}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) write$binfmt_elf64(r1, &(0x7f0000000100)=ANY=[@ANYPTR=&(0x7f0000000000)=ANY=[@ANYRESOCT=r3]], 0xfffffffffffffda1) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) r5 = socket(0x100000000018, 0x0, 0x4) connect(r5, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) setsockopt$IP_VS_SO_SET_STOPDAEMON(r5, 0x0, 0x48c, &(0x7f0000000280)={0x5, 'gretap0\x00', 0x4}, 0x18) open(&(0x7f00000003c0)='./file0\x00', 0x14000, 0x1cb) sendfile(r4, r4, 0x0, 0x8800000) fcntl$dupfd(r2, 0x406, r4) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) fcntl$addseals(r4, 0x409, 0x4) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) r8 = open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r9 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000240)='IPVS\x00') sendmsg$IPVS_CMD_GET_SERVICE(r8, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000300)={&(0x7f0000000580)=ANY=[@ANYBLOB="2f1f8ef2b984242e10d9cf6b3efff770ed0001e8c5008daa1eee4b04a7f3e20b5525aa5b79b6ee69f244c588fe593d56cb23f7f1690008848da7ae1acdc75c344ad062937287043d84cc761d4ed7f7f19e800791c8122f1dc09b3fded397c352e104361755cdf9a3c4e0726acb2c63a933a2525cab90f08bde2658e5314724419d1d78840e240228f590caef6ea3cdad5eea9e81605d373323c4fb864393baca39a25a", @ANYRES16=r9, @ANYBLOB="02002bbd7000ffdbdf25040000005400010008000b00736970000800080006000000080004004e2100000c0007002000000010000000080004004e2100000c0006006c626c6300000000080002002b00000008000b0073697000080001002ed200000800040006000000"], 0x70}, 0x1, 0x0, 0x0, 0x2008c8c6}, 0x801) 23:15:46 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) signalfd4(r2, &(0x7f0000000200)={0x6}, 0x8, 0x80800) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x820e002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) ioctl$FS_IOC_SETVERSION(r4, 0x40087602, &(0x7f0000000000)=0x7) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000180)='/proc/self/net/pfkey\x00', 0x8000, 0x0) write$UHID_DESTROY(r5, &(0x7f00000001c0), 0x4) socket$nl_route(0x10, 0x3, 0x0) r6 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) prctl$PR_SET_SECUREBITS(0x1c, 0x10) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) ioctl$EVIOCGKEY(r6, 0x80404518, &(0x7f0000000100)=""/72) 23:15:46 executing program 1: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r0}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:46 executing program 0: 23:15:46 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:46 executing program 0: 23:15:46 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:46 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, 0x0, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:46 executing program 0: perf_event_open(&(0x7f0000000200)={0x2, 0x70, 0x41, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000c80)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) r1 = socket$unix(0x1, 0x2, 0x0) connect$unix(r1, &(0x7f0000000080)=@file={0x1, '\xe9\x1fq\x89Y\x1e\x923aK\x00'}, 0x6e) sendmmsg(r1, &(0x7f0000002dc0), 0x307017fdb7a66cb, 0x4ffe0) 23:15:46 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:46 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) r0 = creat(&(0x7f0000139000)='./file0/bus\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000027000)={0x1}) recvmmsg(0xffffffffffffffff, &(0x7f0000003140)=[{{&(0x7f00000002c0)=@ipx, 0x80, 0x0}}], 0x1, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000080)='fdinfo/3\x00') preadv(r1, &(0x7f00000017c0), 0x332, 0x0) 23:15:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, 0x0, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:47 executing program 0: r0 = dup(0xffffffffffffffff) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet(0x2, 0x3, 0x2) setsockopt$inet_int(r1, 0x1f00000000000000, 0xd3, &(0x7f0000000000), 0x3c) r2 = socket$inet(0x2, 0x4, 0xfb) setsockopt$inet_int(r2, 0x1f00000000000000, 0xd2, &(0x7f0000000000), 0x3c) socket$inet(0x2, 0x2000000000003, 0x2) 23:15:47 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) r2 = socket$inet(0x2, 0x1, 0x0) bind$inet(r2, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r2, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r3 = socket(0x100000000018, 0x0, 0x4) dup3(r2, r3, 0x0) setsockopt$inet_buf(r3, 0x0, 0xe296ffe036f0b488, &(0x7f0000000200)="0a3985d18a9e66f11c08a236e95a91ffd6bc155d2559ea616d8f5da4a74f2dad9c5e8f2f31799e124dd15abc769fd0f3785fcb6a2db2eb9e597a7a654e08b5bb21cf090cd01414bcf95fe860c56cd4aff25f4e90c8fbf6be482263271a1c76ca3bef82259bf562f3477d036e51ae5f130db6e14dd70f93f3db9bc6757a42ac0993ba03f28173171848a276182cd1202098c2ae8fc15ea69b0daf744b69e9d4f014679eb52a93b37d2b91c2bda0ef7ea3fb0dba8b467bbcc102ce9858d21e5680c58b1214b627", 0xc6) setsockopt$IP_VS_SO_SET_TIMEOUT(0xffffffffffffffff, 0x0, 0x48a, &(0x7f00000001c0)={0x0, 0xffff8000, 0x3ff}, 0xc) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r6 = accept4(0xffffffffffffffff, 0x0, &(0x7f0000000000), 0x800) accept4(r6, &(0x7f0000000100)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @empty}}}, &(0x7f0000000180)=0x80, 0x800) 23:15:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$PERF_EVENT_IOC_SET_FILTER(r1, 0x40082406, &(0x7f0000000000)='-vmnet0\x00') socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:47 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x203ffffd, 0x0) 23:15:47 executing program 0: r0 = syz_open_dev$loop(&(0x7f0000000200)='/dev/loop#\x00', 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup3(r2, r1, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$LOOP_CLR_FD(r0, 0x4c06) 23:15:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x203ffffd, 0x0) 23:15:47 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) ioctl$BINDER_SET_MAX_THREADS(r0, 0x40046205, &(0x7f0000000040)=0xffffffff) eventfd2(0x7fff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') fstat(0xffffffffffffffff, &(0x7f0000000500)) unshare(0x40000000) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) ioctl$PIO_SCRNMAP(0xffffffffffffffff, 0x4b41, &(0x7f00000001c0)="1a84ebabdbab56cdaee4") epoll_create(0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x200004) syz_open_dev$loop(&(0x7f0000000000)='/dev/loop#\x00', 0x0, 0x0) fallocate(0xffffffffffffffff, 0x11, 0x0, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = gettid() ptrace$pokeuser(0x6, r1, 0x2, 0x0) ioctl$UI_BEGIN_FF_ERASE(0xffffffffffffffff, 0xc00c55ca, 0x0) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$LOOP_CHANGE_FD(0xffffffffffffffff, 0x4c06, 0xffffffffffffffff) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) 23:15:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, 0x0) lseek(r0, 0x203ffffd, 0x0) INIT: Id "6" respawning too fast: disabled for 5 minutes INIT: Id "5" respawning too fast: disabled for 5 minutes INIT: Id "4" respawning too fast: disabled for 5 minutes INIT: Id "3" respawning too fast: disabled for 5 minutes INIT: Id "2" respawning too fast: disabled for 5 minutes INIT: Id "1" respawning too fast: disabled for 5 minutes 23:15:51 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r0, &(0x7f0000000100)={0xa, 0x4e22}, 0x1c) listen(r0, 0x1) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) sendto$inet6(r1, 0x0, 0x0, 0x20000004, &(0x7f0000000000)={0xa, 0x4e22}, 0x1c) r2 = openat$selinux_avc_hash_stats(0xffffffffffffff9c, &(0x7f00000001c0)='/selinux/avc/hash_stats\x00', 0x0, 0x0) ioctl$sock_inet_SIOCGIFBRDADDR(r2, 0x8919, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) socket(0x0, 0x0, 0x0) bind(0xffffffffffffffff, 0x0, 0x0) open$dir(0x0, 0x0, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x0) setsockopt$inet6_tcp_int(0xffffffffffffffff, 0x6, 0x12, 0x0, 0x0) ioctl$EVIOCGNAME(0xffffffffffffffff, 0x80404506, 0x0) shutdown(r1, 0x1) recvfrom$inet6(r1, &(0x7f0000001840)=""/31, 0xfbdabf04, 0x100, &(0x7f0000001880), 0x715000) r3 = accept4(r0, 0x0, 0x0, 0x0) sendto$inet6(r3, &(0x7f0000000200)="e5b997fddd402f61a17706a1d4444ee1aa909bdd5b98c93789fd48f97cc7015e8483cc86c9818d14b23c3f7b41ba4391", 0xfffffdda, 0x8dffffff, 0x0, 0xfffffee0) socket$inet6(0xa, 0x2, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r4, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r4, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvfrom(r5, &(0x7f0000000040)=""/184, 0xb8, 0x40016400, 0x0, 0x0) setxattr$trusted_overlay_origin(&(0x7f0000000180)='./file0\x00', &(0x7f0000000100)='_r}sted.ov\x86rley.origin\x00', &(0x7f0000000140)='y\x00', 0x3b, 0x4) 23:15:51 executing program 0: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:15:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) 23:15:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, 0x0, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:51 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_RD_TIME(r4, 0x80247009, &(0x7f0000000300)) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) lstat(0x0, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0, 0x0}, &(0x7f0000000280)=0xc) mount$bpf(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f0000000180)='bpf\x00', 0x80808, &(0x7f00000003c0)={[{@mode={'mode', 0x3d, 0x8000}}, {@mode={'mode', 0x3d, 0x2}}], [{@euid_lt={'euid<'}}, {@permit_directio='permit_directio'}, {@smackfsdef={'smackfsdef', 0x3d, 'group_id'}}, {@fowner_gt={'fowner>', r8}}, {@uid_lt={'uid<', r9}}, {@smackfstransmute={'smackfstransmute'}}]}) r10 = socket$inet(0x2, 0x1, 0x0) bind$inet(r10, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r10, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r11 = socket(0x100000000018, 0x0, 0x4) dup3(r10, r11, 0x0) ioctl$sock_SIOCGPGRP(r11, 0x8904, &(0x7f0000000100)=0x0) sendmsg$nl_generic(r7, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20002000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)=ANY=[@ANYBLOB="2c000000300000012dbd707200", @ANYRES32=r8, @ANYBLOB='\b\x00i\x00', @ANYRES32=r12, @ANYBLOB="1800130002000000"], 0x2c}, 0x1, 0x0, 0x0, 0x20000800}, 0x20008000) openat$selinux_create(0xffffffffffffff9c, &(0x7f00000002c0)='/selinux/create\x00', 0x2, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:51 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) 23:15:51 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(0xffffffffffffffff, 0x203ffffd, 0x0) 23:15:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x0, 0x0) 23:15:51 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x0, 0x0) 23:15:52 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x0, 0x0) 23:15:52 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(0xffffffffffffffff, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r0 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r0}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:15:52 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x3) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:57 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:57 executing program 3: perf_event_open(&(0x7f0000000100)={0x2, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0xc}, 0x8038, 0x0, 0x0, 0x0, 0x0, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$GIO_UNISCRNMAP(r3, 0x4b69, &(0x7f0000000580)=""/4096) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000240)={{0xf312eeba47142e32, 0x0, @identifier="3494a6e1b9d2ca9d2deb7aa4b5257dad"}, 0x5c, [], "06ae21dda57eb22d9e35fc3bfd635de2249713e5e42df53587dc8158576c2b1ea5b9b0a734b3fbc4e4102fff3443948c73f525e469a1eed7f71d423e358abb1750543406109c81be0f12a9f6ff7fe88d7d11b2148cecc9dc3a5559f6"}) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:15:57 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xb8, 0x12540, 0x0, 0x0) 23:15:57 executing program 4: ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:15:57 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getitimer(0x0, &(0x7f0000000000)) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:00 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:00 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) r0 = request_key(&(0x7f0000000000)='ceph\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='!.[-\x00', 0xfffffffffffffffe) keyctl$get_keyring_id(0x0, r0, 0x4) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$RTC_AIE_ON(r4, 0x7001) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:00 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000100), 0x6) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) 23:16:01 executing program 5: r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x100000000018, 0x0, 0x4) dup3(r0, r1, 0x0) getsockopt$inet_mtu(r0, 0x0, 0xa, &(0x7f0000000000), &(0x7f0000000100)=0x4) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) ioctl$FS_IOC_GETFSLABEL(r4, 0x81009431, &(0x7f0000000140)) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) getxattr(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)=@random={'osx.', 'trusted\xa6(\x00'}, &(0x7f00000002c0)=""/30, 0x1e) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:01 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:03 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:03 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000100)=""/186, 0xba, 0x12501, 0x0, 0x0) 23:16:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r4 = socket$netlink(0x10, 0x3, 0x13) setsockopt$netlink_NETLINK_CAP_ACK(r4, 0x10e, 0xa, &(0x7f0000000000)=0x8000, 0x4) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:03 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:03 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) r2 = gettid() ptrace$getsig(0x4202, r2, 0xcd, &(0x7f0000000100)) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:04 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:11 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) r0 = openat$cgroup_subtree(0xffffffffffffffff, &(0x7f0000000100)='cgroup.subtree_control\x00', 0x2, 0x0) write(r0, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$SNDRV_TIMER_IOCTL_GINFO(r4, 0xc0f85403, &(0x7f0000000140)={{0x0, 0x1, 0x4, 0x6a0f292328721bd8, 0x9}, 0x98a, 0x5, 'id0\x00', 'timer1\x00', 0x0, 0x1, 0xfffffffffffff284, 0xe3}) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) signalfd(r5, &(0x7f0000000000)={0x4}, 0x8) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:11 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r6 = inotify_init() r7 = epoll_create(0x5) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r6, &(0x7f00007a8000)) r8 = inotify_add_watch(r6, &(0x7f0000000000)='./control\x00', 0x70) inotify_rm_watch(r6, r8) inotify_rm_watch(r5, r8) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:11 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:11 executing program 4: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x0, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:11 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:11 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:11 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r2) accept4$unix(r2, &(0x7f0000000100)=@abs, &(0x7f0000000000)=0x6e, 0x800) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:12 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$LOOP_SET_STATUS(r4, 0x4c02, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x9, 0x12, 0x1f, 0x19, "516b26a11f5f19ef24241e2433e9eb9c498e195df9d050dc5136ae8142a25795a6f92b6b661c1b624b70567da57232f26f8e8ab91d0a99247652384e991d6400", "c7bf09f18ef61d5df529a7e2de800539f1873fe93867e23c4756a21437c2bf6a", [0x1f, 0xffffffffffffe359]}) r5 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r6 = dup2(0xffffffffffffffff, r0) sendmsg$key(r6, &(0x7f0000000100)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001040)={0x2, 0x10, 0x8, 0x9, 0x229, 0x0, 0x70bd25, 0x25dfdbfb, [@sadb_ident={0x2, 0xa, 0x2, 0x0, 0x400}, @sadb_x_nat_t_type={0x1, 0x14, 0x1}, @sadb_x_nat_t_type={0x1}, @sadb_sa={0x2, 0x1, 0x4d6, 0x58, 0x20, 0x1a, 0x2, 0x1}, @sadb_x_nat_t_type={0x1, 0x14, 0xe4}, @sadb_x_kmaddress={0x8, 0x19, 0x0, @in6={0xa, 0x4e21, 0x0, @empty, 0x6189}, @in6={0xa, 0x4e20, 0x9, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x8000}}, @sadb_x_sec_ctx={0x201, 0x18, 0x1, 0x4, 0x1000, "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"}, @sadb_x_kmaddress={0x7, 0x19, 0x0, @in={0x2, 0x4e21, @rand_addr=0x8}, @in6={0xa, 0x4e21, 0x4, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0xeb8a}}, @sadb_key={0x10, 0x9, 0x3a8, 0x0, "9e88a7b17a4525e8e6cee300eefb9b83eb55cf3599ca9fbf08a65be64eea1d8b49994721e541d3cc8e758e395ce83ef8adc11c9ab2c37802edae768a79c2c074228bdf8dbf7be74ae649b977d68d698856d8686ca51ab0479ea48de4659bde20bfff3eae518bc22b2e50c420419fcb571c2bf48858"}]}, 0x3b2}}, 0x804) 23:16:12 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1405}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f00000010c0)=ANY=[], 0x357) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$FS_IOC_FIEMAP(r2, 0xc020660b, &(0x7f0000001280)={0x800, 0x8, 0x5, 0x84f, 0x2, [{0x6, 0x10000, 0x400, 0x0, 0x0, 0x2}, {0x8001, 0x9, 0x3, 0x0, 0x0, 0x400}]}) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r3, 0xc0096616, &(0x7f0000000ec0)={0x3, [0x0, 0x0, 0x0]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(r5, 0x0, 0x4000) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000002b00)) recvmmsg(0xffffffffffffffff, &(0x7f0000002980)=[{{&(0x7f0000000100)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @remote}, 0x80, &(0x7f0000001200)=[{&(0x7f0000000240)=""/161, 0xa1}, {&(0x7f0000000300)=""/147, 0x93}, {&(0x7f0000000000)=""/49, 0x31}, {&(0x7f0000000180)=""/48, 0x30}, {&(0x7f00000001c0)=""/48, 0x30}], 0x5, &(0x7f0000000480)=""/151, 0x97}, 0x4}, {{&(0x7f0000000580)=@caif=@rfm, 0x80, &(0x7f0000000b40)=[{&(0x7f0000000600)=""/231, 0xe7}, {&(0x7f0000000700)=""/4, 0x4}, {&(0x7f0000000740)=""/151, 0x97}, {&(0x7f0000000800)=""/248, 0xf8}, {&(0x7f0000000900)=""/178, 0xb2}, {&(0x7f00000009c0)=""/55, 0x37}, {&(0x7f0000000a00)=""/46, 0x2e}, {&(0x7f0000000a40)=""/207, 0xcf}], 0x8, &(0x7f0000000bc0)=""/175, 0xaf}, 0xa}, {{&(0x7f0000000c80)=@caif, 0x80, &(0x7f0000000e80)=[{&(0x7f0000000d00)=""/225, 0xe1}, {&(0x7f0000000e00)=""/86, 0x56}], 0x2, &(0x7f0000000ec0)}, 0x6}, {{0x0, 0x0, &(0x7f0000001180)=[{&(0x7f0000000f00)=""/232, 0xe8}, {&(0x7f0000001000)=""/34, 0x22}, {&(0x7f0000001040)=""/49, 0x31}, {&(0x7f0000001080)=""/59, 0x3b}, {&(0x7f00000010c0)}, {&(0x7f0000001100)=""/70, 0x46}], 0x6, &(0x7f0000002b80)=""/4101, 0x1005}, 0x8}, {{&(0x7f0000002200)=@ax25={{0x3, @netrom}, [@remote, @remote, @default, @remote, @remote, @null]}, 0x80, &(0x7f00000023c0)=[{&(0x7f0000003bc0)=""/175, 0xaf}, {&(0x7f0000002340)=""/19, 0x13}, {&(0x7f0000002380)=""/13, 0xd}], 0x3, &(0x7f0000002400)=""/167, 0xa7}, 0xcf3}, {{&(0x7f00000024c0)=@tipc=@id, 0x80, &(0x7f0000002840)=[{&(0x7f0000002540)=""/167, 0xa7}, {&(0x7f0000002600)=""/46, 0x2e}, {&(0x7f0000002640)=""/194, 0xc2}, {&(0x7f0000002740)=""/103, 0x67}, {&(0x7f00000027c0)=""/89, 0x59}], 0x5, &(0x7f00000028c0)=""/138, 0x8a}, 0x3f}], 0x6, 0x12151, &(0x7f0000002b40)={0x77359400}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:12 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:12 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:12 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r2 = socket(0x100000000018, 0x0, 0x4) connect(r2, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) getsockopt$inet6_IPV6_IPSEC_POLICY(r2, 0x29, 0x22, &(0x7f0000000100)={{{@in=@multicast1, @in=@loopback}}, {{@in=@local}, 0x0, @in=@local}}, &(0x7f0000000000)=0xe8) getsockname$inet(0xffffffffffffffff, &(0x7f0000000200)={0x2, 0x0, @initdev}, &(0x7f0000000240)=0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:13 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r4, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r5 = socket(0x100000000018, 0x0, 0x4) dup3(r4, r5, 0x0) r6 = gettid() ptrace$setopts(0x4206, r6, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) write$P9_RSTATFS(r8, &(0x7f0000000240)={0x43, 0x9, 0x2, {0x5, 0x3, 0xfffffffffffffe00, 0xffff, 0x7, 0x1e, 0x1b, 0x20, 0x8000}}, 0x43) tkill(r6, 0x39) ptrace$setregs(0xd, r6, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r6, 0x0, 0x0) lstat(&(0x7f0000000000)='./file0\x00', &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r5, 0x1, 0x11, &(0x7f0000000180)={r6, 0xee01, r9}, 0xc) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:13 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:20 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) getpeername(0xffffffffffffffff, &(0x7f0000000000)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @initdev}}}, &(0x7f0000000080)=0x80) r3 = syz_genetlink_get_family_id$tipc2(&(0x7f0000000100)='TIPCv2\x00') sendmsg$TIPC_NL_SOCK_GET(r2, &(0x7f0000000480)={&(0x7f00000000c0), 0xc, &(0x7f00000001c0)={&(0x7f0000000380)={0xe4, r3, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@TIPC_NLA_NET={0x34, 0x7, [@TIPC_NLA_NET_NODEID={0xc, 0x3, 0x1}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0xc132}, @TIPC_NLA_NET_NODEID_W1={0xc, 0x4, 0x80}, @TIPC_NLA_NET_NODEID={0xc, 0x3, 0x100}]}, @TIPC_NLA_NET={0xc, 0x7, [@TIPC_NLA_NET_ID={0x8, 0x1, 0x9}]}, @TIPC_NLA_NODE={0x20, 0x6, [@TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_ADDR={0x8, 0x1, 0x2}, @TIPC_NLA_NODE_ADDR={0x8}, @TIPC_NLA_NODE_UP={0x4}, @TIPC_NLA_NODE_UP={0x4}]}, @TIPC_NLA_MON={0x14, 0x9, [@TIPC_NLA_MON_REF={0x8, 0x2, 0x9}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfffff10f}]}, @TIPC_NLA_LINK={0x38, 0x4, [@TIPC_NLA_LINK_PROP={0xc, 0x7, [@TIPC_NLA_PROP_TOL={0x8, 0x2, 0x7}]}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}, @TIPC_NLA_LINK_NAME={0x14, 0x1, 'broadcast-link\x00'}]}, @TIPC_NLA_MEDIA={0x24, 0x5, [@TIPC_NLA_MEDIA_PROP={0x14, 0x2, [@TIPC_NLA_PROP_PRIO={0x8, 0x1, 0x10}, @TIPC_NLA_PROP_TOL={0x8, 0x2, 0x3f}]}, @TIPC_NLA_MEDIA_PROP={0xc, 0x2, [@TIPC_NLA_PROP_WIN={0x8, 0x3, 0x8001}]}]}]}, 0xe4}, 0x1, 0x0, 0x0, 0x8cdeb89fa4605442}, 0x4000050) dup(r0) 23:16:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:20 executing program 5: socket$packet(0x11, 0x3, 0x300) r0 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000000)='/dev/fuse\x00', 0x2, 0x0) fallocate(r0, 0x0, 0x200000000001000, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) r7 = pidfd_open(0xffffffffffffffff, 0x0) ioctl$LOOP_CHANGE_FD(r6, 0x4c06, r7) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:20 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:20 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, 0x0, 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d70a2990e8da5aec6c4345eb315fad0b05ad0ed726e7d733362b044f7dffee99f91f66132f27b6b15c5d474e7dd1b2245111fd868207adcc0318fee1dbc7417d8024928b8c6d0f9399a5a3e715f144174034930430fe05b93270246cb5f3c99d8647c881fc6478ef1d46346b69ba48128efb184a9514104ad01419e", 0xf7}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:20 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000100)=""/179, 0xffffffffffffffef, 0x40012540, 0x0, 0xfffffffffffffd92) socket$inet_udplite(0x2, 0x2, 0x88) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000000)={{{@in=@initdev, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@remote}, 0x0, @in6=@dev}}, &(0x7f00000001c0)=0xe8) ioctl$ifreq_SIOCGIFINDEX_vcan(0xffffffffffffffff, 0x8933, &(0x7f0000000240)={'vxcan1\x00', r4}) sendfile(r3, r3, 0x0, 0x8800000) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) 23:16:20 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000200)='attr/\xb6urrent\x00') lseek(r1, 0x203ffffd, 0x0) 23:16:20 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, 0x0, 0x0, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:21 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) memfd_create(&(0x7f0000000000)='nodev\x00', 0x1) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:21 executing program 5: fallocate(0xffffffffffffffff, 0x18, 0x8, 0x2001) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) write$binfmt_misc(r2, &(0x7f00000000c0)=ANY=[], 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) open(&(0x7f0000000000)='./file0\x00', 0x0, 0x12) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f00000001c0)=""/184, 0xb8, 0x40012500, 0x0, 0x0) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r5, 0x800c6613, &(0x7f0000000100)=@v1={0x0, @adiantum, 0x4, "3d480417154ae65b"}) 23:16:21 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) r2 = socket(0x100000000018, 0x0, 0x4) connect(r2, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) getsockopt$EBT_SO_GET_INIT_ENTRIES(r2, 0x0, 0x83, &(0x7f0000000240)={'nat\x00', 0x0, 0x4, 0xa5, [], 0x5, &(0x7f0000000100)=[{}, {}, {}, {}, {}], &(0x7f0000000180)=""/165}, &(0x7f0000000000)=0x78) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:21 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$TIOCCBRK(r3, 0x5428) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') pkey_free(0xffffffffffffffff) sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000)=0xffffffffffffffff, 0x4) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:22 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) write(r3, &(0x7f0000000000)="f7cf14fe0ad48556500fc6a4b191fae461971684b1c4b332e7ef1d5303c37d39d8ccda", 0x23) 23:16:22 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:22 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) write$binfmt_elf32(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x9, 0x4, 0x5, 0x9, 0x1, 0x3, 0x3e, 0x0, 0x178, 0x38, 0x190, 0xf8b, 0x4, 0x20, 0x1, 0xfe00, 0x3, 0x3e}, [{0x0, 0xffffc48b, 0x52, 0x0, 0x9, 0x3f, 0x80000001, 0x2}, {0x3, 0xfd, 0x8b, 0x8807, 0x1, 0x3, 0xfffffff8, 0x100}], "fce28b56ea1a1b3c84013d9008a84f5edf4ee645b45105b767e41a9075e752f2a3b9fd7f827a69238cac15892d492cf7159b0007bc743ed7d5599182444179031021b7f3e28e71eca7f6b1d369bb8766f8982546b08857409d4bc4e48a1a4425b19ddc6bfac9a02e7a64552c60f812adc5cf7e6222ff9bc32fe8a7d30a643e43de001543f74ae09d2ae2f475f41bec157a87005ad60c83086ae880d837208632cb623db812496bc9", [[], [], [], [], [], [], [], []]}, 0x920) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:22 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:33 executing program 0: prctl$PR_SET_SECCOMP(0x16, 0x2, &(0x7f00000001c0)={0x1, &(0x7f0000000000)=[{0x200000000006, 0x0, 0x0, 0xfffffff7}]}) ptrace$setopts(0xffffffffffffffff, 0x0, 0x0, 0x0) 23:16:33 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setsockopt$ARPT_SO_SET_REPLACE(0xffffffffffffffff, 0x0, 0x60, &(0x7f0000000580)={'filter\x00', 0x7, 0x4, 0x4a8, 0x140, 0x280, 0x280, 0x3c0, 0x3c0, 0x3c0, 0x4, &(0x7f0000000000), {[{{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@random="a716f045a71b", @dev={0xac, 0x14, 0x14, 0x13}, @loopback, 0x2}}}, {{@arp={@rand_addr=0x8, @initdev={0xac, 0x1e, 0x6, 0x0}, 0x0, 0xff, @empty, {[0x7f, 0xff, 0xff, 0xff, 0xff, 0xff]}, @mac=@remote, {[0xff, 0xff, 0xff, 0xff, 0xff, 0x1fe]}, 0x9, 0x8, 0xfff8, 0xfff9, 0x6, 0x6, 'yam0\x00', 'teql0\x00'}, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @empty, @loopback, @broadcast, 0x1, 0x1}}}, {{@uncond, 0xf0, 0x140}, @mangle={0x50, 'mangle\x00', 0x0, {@empty, @mac=@link_local, @initdev={0xac, 0x1e, 0x1, 0x0}, @loopback, 0x1, 0x1}}}], {{[], 0xc0, 0xe8}, {0x28}}}}, 0x4f8) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:33 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:33 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x7, 0x1) 23:16:33 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) fremovexattr(r2, &(0x7f0000000000)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00\x00']) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, 0x0, 0x0, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:33 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, 0x0, 0x0, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:33 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000380)='net/sco\x00') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) 23:16:33 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) getpgid(0xffffffffffffffff) r1 = socket$inet(0x2, 0x1, 0x0) bind$inet(r1, &(0x7f00000001c0)={0x2, 0x4e1f, @rand_addr=0x6}, 0x10) fcntl$dupfd(0xffffffffffffffff, 0x406, r0) sendto$inet(r1, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r2 = socket(0x100000000018, 0x0, 0x4) dup3(r1, r2, 0x0) setsockopt$EBT_SO_SET_COUNTERS(r2, 0x0, 0x81, &(0x7f0000000080)=ANY=[@ANYBLOB="66696c7465720000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000100000000000000", @ANYPTR=&(0x7f0000000200)=ANY=[@ANYBLOB="f900000000e77515000000000000000000000046519c89fd65fd517792b809f1fc53c78a8548df8112b9fcada20ca5a66da97a7dcd9bec8515106a6e6716826bd64a7ad9e1bd979837092322b31474b7b2f2c8a0913ab446b30bf98fa60b3c9a"], @ANYBLOB='\x00'/24], 0x88) r3 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net\x00') r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000040)='/dev/full\x00', 0x80800, 0x0) ioctl$KDSETLED(r4, 0x4b32, 0x8) lseek(r3, 0x203ffffd, 0x0) 23:16:33 executing program 0: 23:16:34 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) getpid() r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='bdev\x00'}, 0x30) syz_open_procfs(r1, &(0x7f00000000c0)='wc\x04\x00\x00\x00\x001\xf1\xfd\x99\x8d\xa7\v\xa9\xbf\x19\xf7I\xb0\xe1mX^\x0f\x84`\x98\x9b\xba\x04\x8e\n\x8bn\x94\x10\xc7') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) 23:16:34 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r0, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r1 = socket(0x100000000018, 0x0, 0x4) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) dup3(r2, r1, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x100000000018, 0x0, 0x4) dup3(r3, r4, 0x0) setsockopt$inet_msfilter(r3, 0x0, 0x29, &(0x7f0000000100)={@multicast2, @dev={0xac, 0x14, 0x14, 0xf}, 0x1, 0x2, [@multicast2, @multicast2]}, 0x18) getsockopt$inet6_tcp_TCP_REPAIR_WINDOW(r1, 0x6, 0x1d, &(0x7f0000000000), &(0x7f0000000040)=0x14) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r6, r6, 0x0, 0x8800000) ioctl$SIOCGSTAMPNS(r4, 0x8907, &(0x7f00000001c0)) lseek(r6, 0x1ff, 0x4) 23:16:34 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$BLKPBSZGET(r1, 0x127b, &(0x7f0000000c40)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) write$binfmt_elf32(r2, &(0x7f0000000380)={{0x7f, 0x45, 0x4c, 0x46, 0x40, 0xff, 0x5, 0x5, 0xfffffffffffffffe, 0x1, 0x6, 0x3, 0x3b7, 0x38, 0x2ef, 0x9, 0xf611, 0x20, 0x1, 0x8, 0x6f, 0xfff7}, [{0x3, 0xded, 0x1, 0x9, 0xc1, 0x10001, 0x0, 0x6}, {0x60000000, 0x667e, 0x3, 0x10000, 0x200, 0x7f, 0x8, 0x8}], "dc0694ef66b4cafc59bd18f24f331b", [[], [], [], [], [], [], [], []]}, 0x887) mincore(&(0x7f0000ffe000/0x1000)=nil, 0x1000, &(0x7f0000000000)=""/215) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r4 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000100)='/dev/vga_arbiter\x00', 0x10000, 0x0) ioctl$VT_GETSTATE(r4, 0x5603, &(0x7f00000001c0)={0x810, 0x0, 0x2}) lseek(r3, 0x203ffffd, 0x0) 23:16:34 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) write$binfmt_elf64(r0, &(0x7f0000000100)=ANY=[@ANYRES64=r2, @ANYRES64=r1, @ANYBLOB="b2d214cfe6f17cf0549de010801cf4e430294f8c0b82c6609486037ac23ce762c00370ea6f45da010a7846e4cbb659a750fe7aa1ca75d20aac9c2a28ad70ad758d66b9e71c70b6ecd35f3084f24b4236bd4f9fd1cefad0e6daf04797cade6dde14ecb1690559a67c849f925c37759f93b3ce67cce5c11ae518931fcd73a59270ac1d7811047dad6de1385e339120f4a19b1e4fa1bbe45d2aef54a14255ca1867031950b1e36dbbd2bcd53e9c27797387e9f17e3f21516d47de4ea6587cc8fe844b2008eb419a241b5a4e6ce2a34d1018c3bc1c5cc0a69c05cdbc41d73756995ab5c23d4c86", @ANYPTR=&(0x7f0000000000)=ANY=[], @ANYPTR, @ANYPTR=&(0x7f0000000240)=ANY=[@ANYRES64=0x0], @ANYRESOCT=r3], 0xffffffffffffff70) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:34 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:34 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) capget(&(0x7f0000000000)={0x20071026, r1}, &(0x7f0000000040)={0x6, 0x5, 0x5, 0x5, 0x100, 0x7ac}) 23:16:34 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r4, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r5 = socket(0x100000000018, 0x0, 0x4) dup3(r4, r5, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1220000}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x1c, 0x32, 0x100, 0x70bd2b, 0x25dfdbff, {0x15}, [@typed={0x8, 0x8d, @u32=0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x80100}, 0x1) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:34 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) timer_create(0x6, &(0x7f00000000c0)={0x0, 0x31, 0x4, @tid=r1}, &(0x7f0000000100)=0x0) clock_gettime(0x0, &(0x7f00000001c0)={0x0, 0x0}) timer_settime(r2, 0x1, &(0x7f0000000200)={{0x0, 0x1c9c380}, {r3, r4+10000000}}, 0x0) r5 = gettid() ptrace$setopts(0x4206, r5, 0x0, 0x0) tkill(r5, 0x39) ptrace$setregs(0xd, r5, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r5, 0x0, 0x0) r6 = syz_open_procfs(r5, &(0x7f0000000080)='net/netlink\x00') lseek(r6, 0x203ffffd, 0x0) 23:16:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:42 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:42 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r3 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @multicast2}, 0x10) setsockopt$inet_tcp_int(r3, 0x6, 0x2, &(0x7f0000000240)=0xfff, 0x4) sendto$inet(r3, 0x0, 0x0, 0x20020005, &(0x7f0000000000)={0x2, 0x4e21, @remote}, 0x10) setsockopt$SO_BINDTODEVICE(r3, 0x1, 0x19, &(0x7f0000000080)='sit0\x00', 0x10) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = socket$netlink(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$NBD_CMD_DISCONNECT(r6, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000ac0)=ANY=[@ANYBLOB="7f454c46090203080500000000000000000000000400000039020000000000004000000000000000ce01000000000000070000000600380004000000000102000c00000000000000e30900000000000002000000000000000500000000000000be000000000000000000000000000000000000000000000006000000c000000080000000000000000100000000000000ff07000000000000ff0300000000000003000000000000008a000000000000004fc2b0ad5e93725ea6ac504e21c31abd20544859d2b835160472bb0d6bf726d9d1deaeeae2f6f63215648feb43e67cd4bfbc463486ec88baea6898e34b85721849817f4e2490c67f3ea7b5ebde8e912307f685e1ff1b36263ebc25c4e7eb2f192308f8b28dd4ed68b64429992d2c312b96db82f69d1005bc1e57cc5aa95519c06f2c866dd190b7ac8ab147ec8d050ccc5a15e1ced3e1f1ee4638d8b2821fb878e9a518e5d549a98d255300e45d2129c1606fda861874bbeacd3dfc2e927d83e7a1256cdcca59c7bb2b90c433442581cb477b9284763a93b06f64f76d54d1186b1c833f256e82971f86b12ab061f147e603ec7605cae50000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000150000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001000000080000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000009941462a117cf4bdc72d34701c8f67cd80d55742265186e6a1820ccb3b4e7206093bf4567368310da702a37cbe110320d51669a6e42205c6abff68ea77517ff5677e27b2b2971681d21f0c965323aa1a1d745f43e2a21eec57ebab37f9f2af65dd12d7f796bcda91681ae01eaf69105f7d818afa808"], 0x5a6) sendmsg$nl_route(r4, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000240)}, 0x0) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000200)={@rand_addr="3bcbc72dc911e64c7a1e9481f07bed96", 0x6a}) r7 = perf_event_open(&(0x7f0000000040)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_inet_tcp_SIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000140)) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r7, 0x2405, 0xffffffffffffffff) finit_module(0xffffffffffffffff, 0x0, 0x0) shutdown(r3, 0x400000000000001) gettid() 23:16:42 executing program 0: 23:16:42 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='maps\x00') bpf$BPF_MAP_FREEZE(0x16, &(0x7f0000000240)=r0, 0x4) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) r5 = socket(0x100000000018, 0x0, 0x4) connect(r5, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) getsockopt$bt_hci(r5, 0x0, 0x2, &(0x7f0000000100)=""/213, &(0x7f0000000000)=0xd5) r6 = openat$fuse(0xffffffffffffff9c, &(0x7f0000000280)='/dev/fuse\x00', 0x2, 0x0) fsetxattr(r6, &(0x7f00000002c0)=@random={'osx.', 'maps\x00'}, &(0x7f0000000300)='@lomime_type%\x00', 0xe, 0x2) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:42 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) fallocate(r0, 0x20, 0x7, 0x1048) r1 = socket$inet(0x2, 0x1, 0x0) sendto$inet(r1, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r2 = socket(0x100000000018, 0x0, 0x4) ptrace$cont(0x1f, 0xffffffffffffffff, 0x81, 0x1) dup3(r1, r2, 0x0) sendto$inet(0xffffffffffffffff, &(0x7f00000003c0)="779504a6c5ac001c990946e05269fc1e694b19e88a0a6a2ed570301f73509de43e6612c2660a1433722a476b9ad5a20934334be982ec5756355c629d829758a9d536346bbcb64590972e5e3085deb50bde87235de4a8fb0adea1dd58cabce4e731c35cc161a343ab67fd2adfdaf73083cde20aab128413b68eef5725684628a45d7cb6bd077603f974ab88ee45142fde904d990051a522cee0323c1cd7bdb2ff05332da26e5bbaaaba7cfed8057a4d206078b9aacc0182eb637f7d35d37a6ce9f14e7a8acba9eb208c80a8ca17d96ec4ec621e5b986cd95e8dc25f0c", 0xdc, 0x20008044, &(0x7f00000001c0)={0x2, 0x4e21, @broadcast}, 0x10) setsockopt$inet_tcp_TCP_MD5SIG(r2, 0x6, 0xe, &(0x7f0000000000)={@in={{0x2, 0x4e23, @empty}}, 0x0, 0x1, 0x0, "1321d6582edf51445e999f48979fd4b548722ffe1c5a45e58933f6d9c4ca3e89ab1394fc1103e34db8bb1de55764a0b2c72cac3e64af7e7125f9e8a7ca6d5d3cc252ecb45464ce8a02516f05d919c12b"}, 0xd8) prctl$PR_SET_MM(0x23, 0x0, &(0x7f0000ffe000/0x2000)=nil) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) dup(r3) ioctl$TUNSETVNETBE(0xffffffffffffffff, 0x400454de, &(0x7f0000000100)=0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r4, 0x203ffffe, 0x1) 23:16:42 executing program 0: 23:16:42 executing program 0: 23:16:42 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYRES16, @ANYRESHEX], 0x0, 0x2b}, 0xffffffffffffffb4) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:16:42 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f00000001c0)=0x3, 0x4) socketpair$unix(0x1, 0x7, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$EVIOCGMTSLOTS(r3, 0x8040450a, &(0x7f0000000040)=""/155) lseek(r1, 0x203ffffd, 0x0) ioctl$sock_SIOCOUTQ(r0, 0x5411, &(0x7f0000000100)) 23:16:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:42 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) 23:16:42 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:42 executing program 4: r0 = openat$selinux_enforce(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/enforce\x00', 0x200000, 0x0) r1 = syz_open_pts(r0, 0x20000) mmap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2, 0x110, r1, 0xb4b26000) write$P9_RREMOVE(r0, &(0x7f0000000040)={0x7, 0x7b, 0x2}, 0x7) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) 23:16:42 executing program 5: r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) fallocate(r0, 0x0, 0xfffffffffffffff7, 0x8f) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) write(r1, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) write$binfmt_misc(r2, &(0x7f0000002140)=ANY=[@ANYRES32, @ANYRESDEC=r4, @ANYRES64, @ANYBLOB="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"], 0x1020) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = openat$null(0xffffffffffffff9c, &(0x7f0000000000)='/dev/null\x00', 0x42000, 0x0) setsockopt$netlink_NETLINK_TX_RING(r6, 0x10e, 0x7, &(0x7f0000000100)={0x2, 0x81, 0x9, 0x6}, 0x10) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r8 = dup(r7) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) r9 = openat$cgroup_procs(r8, &(0x7f0000000140)='tasks\x00', 0x2, 0x0) r10 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) pipe2$9p(&(0x7f0000000180), 0x4000) r11 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) ioctl$BLKROSET(0xffffffffffffffff, 0x125d, &(0x7f00000001c0)=0x1) sendfile(r11, r11, 0x0, 0xffff) r12 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r12, r12, 0x0, 0x8800000) r13 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r13, r13, 0x0, 0x8800000) sendfile(r13, r10, 0x0, 0x8800800) ioctl$FICLONE(r9, 0x40049409, r10) r14 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r14, 0x8912, 0x400200) recvfrom(r3, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:43 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14d5a7caeceeaa64, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:43 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) pipe(&(0x7f0000000000)) ioctl$TIOCGSERIAL(r0, 0x541e, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000440)=""/198}) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x100000000018, 0x0, 0x4) dup3(r3, r4, 0x0) setsockopt$inet6_tcp_buf(r4, 0x6, 0xd, &(0x7f0000000380)="bf2c1708e5f48137995703eafb1ca8832ce2f521268cb34effbf7fe4f3da0869c36c7f3b04cd4943ca11532d4a04164fcc771c84a3ea5dd41e37d763371783cc85db1b36454bb88b4e1ef17a65576fa04344a88f4c6041a4cc8e25a0984e20", 0x5f) r5 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000040)={0x3, 0xcf, 0x20, 0x0, 0x8, 0x1, 0x80, 0x6, 0x7fffffff, 0x5, 0x4, 0x7}) ioctl$UI_SET_RELBIT(r7, 0x40045566, 0x2) creat(&(0x7f00000001c0)='./file0\x00', 0x8) lseek(r5, 0x203ffffd, 0x0) 23:16:43 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = syz_open_dev$binderN(&(0x7f0000000080)='/dev/binder#\x00', 0x0, 0x0) mmap$binder(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x1, 0x11, r3, 0x0) ioctl$BINDER_SET_CONTEXT_MGR(r3, 0x40046207, 0x0) r4 = syz_open_dev$binderN(0x0, 0x0, 0x0) ioctl$BINDER_WRITE_READ(r4, 0xc0306201, &(0x7f00000002c0)={0x4c, 0x0, &(0x7f0000000340)=[@transaction_sg={0x40486311, {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffff59, 0x18, &(0x7f00000000c0)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/123}, @flat=@handle, @fda}, &(0x7f0000000200)={0x0, 0x18, 0x30}}, 0x200}], 0x0, 0x0, 0x0}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, r0, 0x0) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r2, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:43 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={r0, 0xffffffffffffffff, 0x0, 0x5, &(0x7f0000000000)='bdev\x00'}, 0x30) capset(&(0x7f0000000080)={0x20080522, r1}, &(0x7f00000000c0)={0x1, 0x1, 0x8, 0x3, 0x5, 0x7}) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) 23:16:43 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ftruncate(r0, 0x0) lseek(r0, 0x203ffffd, 0x0) [ 566.193299] binder: 31631:31632 transaction failed 29201/-22, size -167-24 line 3284 [ 566.543101] binder: undelivered TRANSACTION_ERROR: 29201 23:16:45 executing program 0: clone(0x7fc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = gettid() wait4(0x0, 0x0, 0x80000000, 0x0) sendmsg$nl_netfilter(0xffffffffffffffff, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000400)=ANY=[@ANYBLOB="d3d2b93c38f19c0400cd8034"], 0xc}}, 0x0) ptrace$setopts(0x4206, r0, 0x0, 0x0) socketpair$unix(0x1, 0x3, 0x0, &(0x7f0000000280)={0xffffffffffffffff}) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) r3 = fcntl$dupfd(r1, 0x0, r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYRESOCT, @ANYRES16, @ANYRESHEX], 0x0, 0x2b}, 0xffffffffffffffb4) tkill(r0, 0x3b) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) 23:16:45 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000001480)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xec\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6\x9f\xbb\xca\xf8t\x9e\xeeW\xf0fFm\x91\xae\x05A+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&\x15xVtEp\xde\xca\\N-\xca\xac\x94\x9a-\xa0Fa\x96\xdf\xda\xb0\x92\xbe\x05\x96\xd0\x82\x1c\xf2j\xd8\xa6\x87\xf5Mc\x87R`\x89<\aeD\t}7\vt&\x82\x8bG\x85\x95\x1a)I\xbf\xef\xd2\xd0\x94v\xe0=\xca\xf9h\xf8\xf1\x92P}') socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) r2 = inotify_init1(0x80000) flistxattr(r2, &(0x7f0000000480)=""/4096, 0x1000) truncate(&(0x7f0000000000)='./file0\x00', 0x12c) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r3 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r3, 0x203ffffd, 0x0) openat$smack_task_current(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/attr/current\x00', 0x2, 0x0) 23:16:45 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) fcntl$addseals(r6, 0x409, 0xa82c3b618259deae) r7 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) write$binfmt_misc(r4, &(0x7f0000000000)={'syz1', "2a1d2690cfee538e9875ce"}, 0xf) flistxattr(r5, &(0x7f00000001c0)=""/252, 0xfc) ioctl$RTC_PIE_ON(r7, 0x7005) r8 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r8, r8, 0x0, 0x8800000) ftruncate(r8, 0x2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:45 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) write$binfmt_script(r4, &(0x7f0000000100)={'#! ', './file0', [{0x20, '-[\''}, {}, {0x20, '$)%selinux'}], 0xa, "29469f0f3cff4b16f7a03f41f5d489355f848667fecac5bba90b292ee20ffbb5fa84e40f286a948681efddd36f366b7b440a4fb3f0ff23aad341b20c682ac1c20e7e7ccff1d8847c2804815266374a55adac4452258752308de1cb2bd624dfdf872f71251819979be8fda2df2bbfeabb430ed15793c571df3484"}, 0x95) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:47 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:47 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) r4 = add_key$keyring(&(0x7f0000000000)='keyring\x00', &(0x7f0000000100)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffff9) keyctl$get_security(0x11, r4, &(0x7f0000000140)=""/4, 0x4) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) ioctl$EVIOCSFF(0xffffffffffffffff, 0x40304580, &(0x7f0000000000)={0xbc4f8baac958d37e, 0x40, 0xc9, {0x1, 0x8}, {0x6, 0xf001}, @cond=[{0x683, 0xffff, 0x2, 0x0, 0x7, 0xff7f}, {0xd2ec, 0x0, 0x6, 0x3ff, 0x9, 0x18}]}) 23:16:47 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) write$binfmt_elf64(r2, &(0x7f0000000380)=ANY=[], 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r4, 0x0, 0x0, 0x8004, &(0x7f0000000080)={0x2, 0x4e21, @multicast2}, 0x10) r5 = socket(0x100000000018, 0x0, 0x4) fsetxattr$security_ima(r0, &(0x7f0000000100)='security.ima\x00', &(0x7f0000000140)=@md5={0x1, "5507f571961b09d33df0db1b0446e519"}, 0x11, 0x2) dup3(r4, r5, 0x0) r6 = socket$inet(0x2, 0x1, 0x0) bind$inet(r6, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x10006}, 0x10) sendto$inet(r6, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r7 = socket(0x0, 0x4, 0x20) dup3(r6, r7, 0x0) r8 = syz_open_procfs(0xffffffffffffffff, 0x0) accept$inet6(r8, &(0x7f0000000800)={0xa, 0x0, 0x0, @local}, &(0x7f0000000840)=0x1c) r9 = syz_genetlink_get_family_id$SEG6(0x0) sendmsg$SEG6_CMD_SET_TUNSRC(r8, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000200)={&(0x7f00000001c0)=ANY=[@ANYBLOB="40000200", @ANYRES16=r9, @ANYBLOB="000326bd7000fddbdf2503000000080006001f00000008000500030000001400010000000000000000000000ffffffffffff0800050004000000"], 0x3}}, 0x20000140) sendmsg$SEG6_CMD_SET_TUNSRC(r7, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x44, r9, 0x400, 0x70bd2c, 0x25dfdbfe, {}, [@SEG6_ATTR_DST={0x14, 0x1, @rand_addr="b8ae040bc43c2042b35b183324e0951f"}, @SEG6_ATTR_DST={0x14, 0x1, @initdev={0xfe, 0x88, [], 0x1, 0x0}}, @SEG6_ATTR_DSTLEN={0x8, 0x2, 0x6bd9}]}, 0x44}, 0x1, 0x0, 0x0, 0x20000080}, 0x80) setsockopt$IP_VS_SO_SET_ZERO(r5, 0x0, 0x48f, &(0x7f0000000000)={0x3c, @multicast1, 0x4e23, 0x1, 'fo\x00', 0x2, 0x1, 0x73}, 0x2c) r10 = dup(r3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r12 = dup(r11) ioctl$PERF_EVENT_IOC_ENABLE(r12, 0x8912, 0x400200) getsockopt$EBT_SO_GET_INFO(r12, 0x0, 0x80, &(0x7f0000000280)={'filter\x00'}, &(0x7f0000000300)=0x78) ioctl$PERF_EVENT_IOC_ENABLE(r10, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100)='/dev/rtc0\x00', 0x8000, 0x0) ioctl$RTC_UIE_ON(r0, 0x7003) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) mincore(&(0x7f0000ffc000/0x3000)=nil, 0x3000, &(0x7f0000000380)=""/229) lseek(r1, 0x203ffffd, 0x0) 23:16:47 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r0 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r0, r0, 0x0, 0x8800000) lseek(0xffffffffffffffff, 0x20400001, 0x4) 23:16:47 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:48 executing program 0: syz_emit_ethernet(0x2a, &(0x7f0000000040)={@link_local={0x1, 0x80, 0xc2, 0x0, 0x0, 0x2}, @remote, [], {@ipv4={0x800, {{0x5, 0x4, 0x0, 0x0, 0x1c, 0x0, 0x0, 0x0, 0x0, 0x0, @rand_addr, @broadcast}, @igmp={0x0, 0x0, 0x0, @multicast1}}}}}, 0x0) 23:16:48 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) ioctl$FIBMAP(r0, 0x1, &(0x7f0000000000)=0x1e) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) r6 = dup3(r2, r5, 0x0) getrandom(&(0x7f0000000100)=""/228, 0xe4, 0x3) ioctl$UI_DEV_CREATE(r6, 0x5501) 23:16:48 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x1c9e1ef40ee63e7f) ioctl$TUNSETCARRIER(r0, 0x400454e2, &(0x7f0000000040)=0x1) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x1, &(0x7f0000fa4000/0x2000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKPBSZGET(r3, 0x127b, &(0x7f0000000080)) 23:16:48 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) accept(r3, &(0x7f0000000100)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @dev}}}, &(0x7f0000000000)=0x80) ioctl$sock_inet_tcp_SIOCOUTQ(r4, 0x5411, &(0x7f0000000180)) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) sendmmsg$inet6(r6, &(0x7f0000001840)=[{{&(0x7f00000001c0)={0xa, 0x4e23, 0x4de, @local, 0x5}, 0x1c, &(0x7f0000000600)=[{&(0x7f0000000240)="e4e0a9f4f587f9920d9ec85cd43646624b80babf138e48dbc2338f7fac97c8b1b773887cac452d6729e705b9e05a5817b8c0b73244b1e9dc457ecdbdd2974b0bbd20a4903ed67eac1f2460a7481822bc6a1d09", 0x53}, {&(0x7f00000002c0)="65935bae23c1407e8dbde17b7fbbad54fa3784a484ed200e26d5455d31fd8da7062ffd0ddfc002d02c7b31abd2cc3796596b26468089aaf56ea696cc", 0x3c}, {&(0x7f0000000300)="dadd52e2bd7ef998efe61e8c0995592a1a32facb4286015294674e19ca76a0368348575303f8b2a4d6f5d473eb6816b923edc0f26260f34cf5d41a347166d978b289b08a99eb6a4302cd0363ed748b60329f858882ef87462c695d23ee9989895b0b07c66ee1f27533e524a460f40b7431d2aeb4fa2f6f553a46781b17e7127a551de1d895f6f37e82e6b4110a5fb9480ad236b5cb4cb7cfbe942d61bbc5bd2ef5b4a3330e13c38900949c5664510c693c3e9e90b2f4c86ef941e592c33a42a06d231820f8bad7f19f1227a50dc49dca34b8b4fa980b4deff58f440fcb9787521500df4086d3b335e2df6c406ede", 0xee}, {&(0x7f0000000400)="f8aed76f38a13cbead528b801160d747de958e358762ea31c9e3164fbf641347b98f", 0x22}, {&(0x7f0000000480)="b64afb48a4e42bbf2682607b8e323b88785a76ff573404fcb9a34166d08868e4b65321bfba27fe47b97797252410bed66e4bb6e3323a7e674f7e123624da1af00e6f94cd8677ce8dae53c1c9d1f68438eff443b57aca71e7ba8b563fd1fff3411b70e0536425d3ab686042362d64c79d01e13ec512582188f05d", 0x7a}, {&(0x7f0000000500)="0ca7b89650b3b119b3ad9115e539383a13432906ce4ab85a37c8539a466b", 0x1e}, {&(0x7f0000000580)="778d2445f38980c96256757562e79041f143707e484c26c53bb72fc9990031b7e8558e0e37025da760ccd72b13107be78a18b7e5b7a746b7984744cd807d29c6463fb30d8dfa972cf7a0234950ff3d2ca52c0b3888c96a722f11503655f4feb9eeddd07b0cee3300", 0x68}], 0x7, &(0x7f0000000680)=[@dontfrag={{0x14, 0x29, 0x3e, 0x20}}, @tclass={{0x14, 0x29, 0x43, 0xfffffffb}}, @flowinfo={{0x14, 0x29, 0xb, 0x4}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x58, 0x2, [], [@pad1, @jumbo={0xc2, 0x4, 0x4}, @enc_lim={0x4, 0x1, 0x6c}, @enc_lim, @pad1]}}}, @rthdrdstopts={{0x30, 0x29, 0x37, {0x11, 0x2, [], [@hao={0xc9, 0x10, @initdev={0xfe, 0x88, [], 0x1, 0x0}}]}}}, @dstopts_2292={{0x28, 0x29, 0x4, {0x89, 0x1, [], [@ra={0x5, 0x2, 0x2}, @ra={0x5, 0x2, 0x118}, @jumbo={0xc2, 0x4, 0x7ff}]}}}], 0xd0}}, {{&(0x7f0000000780)={0xa, 0x4e23, 0x5, @loopback, 0x9}, 0x1c, &(0x7f0000001800)=[{&(0x7f00000007c0)="a2", 0x1}, {&(0x7f0000000800)="b7f812fb991eb714062839f24885bfc0bd02cb6f3338a7db49d052ddf55273e938496a03572a182ee0be6dcaa748109b8b706098abc5c1683dac4e3285e77bd9c6aedbd310f5eb1368061915e2fe49c6473341e77679e508017d56763a8124b137d909c8b4a12a51fb7d040a5f87ee8ff0216d9a057a6d5b2eac71b1be5a6e14f773c6ce6f8d339341c5bd70f1592dd5ad49f503b0c31cc8f5b7eb39827a5cd886066a5e8c65ed8cb293fe68ac595849d3160965a534d127717759a3c72e669181f2f332b22d9c73c9bfbf599de3ebe96b5d0f5e8345f997864f33a9184415eed09cf4e00183b3c6d341fab460a4a436fbbaaef906b120dcc5974661fcb17213e7663306a0dae89478eb0e7913d80c4f04a706829066a42ee393d68db31156b545f5f2c0b3e9b2714c318bdd34342472dd7965dae3aa8f3d018b26cd0ddd757463287141d670d71989c59dabf7e30587817e452c87c20e9fc1fa1cff4e1a385d0a703a10322ed41cd055189de25d4b8c29c5fe4fbc3e21f3b352f3796c46172f803391ebe351a03296e6db3b4abf8b26fd4c01d50672ebdaf30e9ce88301d5145fc500dbbb5709d4603dfcb9b900a4221fc6b977eb86fc198452b647b9ac9784ee002141ed6e9e445683c790f8bb2c1f7f5ec36f3ea1619d946f7c60d278f829927f1843373c6f19fb6dbcad26b04548a6f8457b604dc7682cd5cb5b5ed108819e24a13678a3a286d690169532fffddda42fe797bffd55e8efbe4237d578f1eea8183004d843c1353c0b4b9f136fa56a31cb7f761c46b8f7b25d50c9b1e2c7f96a835f56409871decaebf1b21b100605391d1368f7306b5bd784c63f936dcdbc80947ade4b3ed715c7faec64840edbf660d5e06d48d90a1ded23320def564783d693c9557ad46c02b1201d9bc17ce2a2a0e1cb3db1a4badedfe5186022c59851d5d92012caf28553e10d247fe7cdc71c48a0ad7754a0600b52b7b3363addb1dcfc288e6e1916d7f897885c16cea73c87a65c9b26bc5bcacdf0c83486ea67d02393462d32fd7134a26251df6dbaff4da6738782c807540464d1e7a63f288389cb4f1057d1e14dd97afc2a3d78b4b61bdc97a88a466b4aca14fd3033ddc398907ed097629ac45c711ea7af18df1bc0625c4cb777b449d1da47846fb564e4285e750626ab81f9d00c8b38ac12b06e5518c3b3197c650861753676114ded638d23ed6c6c24b343dfc4e347e5feda189fbcd16486160b45f06dbaa99e879f75dac321eb52969356fa4b564f7900664213c825fd3b6ead0009126e8ed7ed2a7837f145cb1222a2ae88bd44a47c901044284d1ad01b06a7d4d991464dfd0d739a202bd18d83b0dfa528bd31606b559694856adaa1fa784bac3b098a4a8b02c95ce6d7bdbb38477e785d8d61b3cc047f45758ece70951b33a5e84c28b0ff3a636f9014ac6c74633d20102965a1cda0603fcca6a89109884358dd675dcdb372f6244c3b09ddb9ea78b50a8e2198c5c02c99f0b70fdd9307a03b25fa058e2410eb5814eaf4dc64fbaff0b9ebd5b4401ddc152971046e4ca20ccec13839610307718177d7b7e85450f508abe74bc78ca67fec616bc71d5303e3b198c8b3a2891dd3520a8d64ea958aee4e0625a9c5f53d9b0e1b44f5ec6bc9b3d90ff2fdb49f42b1480a0d33a85c91ae4571e8dd597f8a093b7e3d2a63de7a1ad219e495c86bbc237d12e5cdae4bf951e6abee59413962918176168ba76df1f9b9af46aa54927844ecdc09406e6b50f220183dbaab6826c4453f89789e8775f823323b6c46cb2d2745dec764a790a7e6252a3c2d36d57f213037ad5d4d19ebb7de811c7b1c5504da3ef0a8a3d12077a1592fd6ffe62ac9409e60d4e16578dfa6d37fd77feacc4bab9469144b560ac6041270c85d566d91cbeaa6ba5d7c5e2d0203f41dbcbd5b7f465f9ef5c114c51e835aa73c35649e7cbc279d536f5f739bbb3fd3c0e47bfb6a6a177de03c5f7feec84022b77063bb693894b566da1c6249d4c0284ea9197a5922c36d914b1b98ecc283e69b2aa9c74fb00760cec04d25c2990fbba85eeea66ded965e6ca9978792bdfa96fc2c7bc646d4c23ae44954c5563e41546697f7c8d9d76c449701de3e0148f30406952354f8bb58b501067bdc1850fb3287cc9299929ffc3784548ac1292381e176e0e8d7dc724f93f8977fad377cbfb771892b434819425c093ae0fef890df9bb27ce771ec9860a9cb4a9e496c23dc62ba218be9f32626761e8f1aadf7580361e08a4bee4c9121233884e0713e6bed5f98795c91d0015bff5326d1df9c4d132c59bf895dbcbe13054686ca9c097661c20509e8d695a00863a6302849eb50c5cef458aa3c28035bcf8dbdd067202aed3a27459474a6c24c7ea9433e1811398dabfe03ea36566e4b35710097bda5ba84bb20fc2eb138d127de18b6159d1bcb45f7066fea95265a4f02268afd9a6b4356c24a9fb6999a98df509ecededfb4a44567fe2c8c3564e8f3b139846ca7f1db57e602ba35660640c665e9a9620d8b5ec2e310e04b1ca2cd1d3961e73305dbfc3c66763f4ba5fa5a843461a6e279ff1e28ad11b2c38dd4c98f58e7b1a7d1f7b1402645070f5fb6d87469e939b5ee3b8c3c1a1d6589b2ae3965afefbc168fa61a8a3ece27567915916fe888df1487576496298dce4edcb30138085ca03fbc967acf2fa876158e38fbafbba817a7423e62a637c2ec33b2173401dc450ca908efbfd09c4ddf24f6e7bc6d6f1ae3c8966b329ab6977eb2263f916807db25a16b1a142eab68bb5f6a7cb60d40f686c6b641ff62c0f1849aaa6d606e7b4d7729b1595b9e05dc826b55003ed72f3e860aeb63ab650d32ae5a1fd22e4d462abb3028b474cd941017a7e658275584fc551c596a74c1f210ac8185160da1942636cf25a79a196a42fe87b90a382c8ae3f86fc5c3d6923992f206917abd94687eb56c38b841728e45097b9c65410e2759c5efa919ebb646bc695c071b0e8e75706415ce3f36bfc3e6affe1c51aa70ea047a7e40b328fb011fb7fe32eb65246780078d4c04171c07b3b81196f5f55d41433d9e384d761681ac8fe8012699a47b06466114661ac460584dd527d93dab206c5fbaa060f320b12699cd718708e0a5f3fb5507025991322ff40f83279b90bb2dad043eb92e41886bf2191c298fbb53c7c123cf2ca2c267cada5b304b76c315ac76c115011e29935d86bf93595b0d64ed0eed2a1651e58d52c62201e11eacf78969d342624220cb97fb4efe55a35dc6849413c113ee30e2ee3f5db9563eecb94b3cd4eaf0ec9220da2d94ae13593b5314e093da091998ddd9488ba02a590e33375d9520ddfda870bbd23fdf8458f248abc66ce18471d1b800f1cf6348e174771fd372a02c011ad0a432cca0ea6fe4d2d2387f5a3cf08e72406a5cf98d6f9a850e62818d6b2cc42dba7746e660854d44f2eb0f95ea8d9d5b89bbef9eda9b028eb4bc359ca0a235e2c5e2ff84603eed9adc83ef60baeb31eed87c12e302f6f168850883ac6b99821e017dd0c2845fa3ed5b6d699bb9885eeafe81805217d84b646b6f036131d2d98454fe8c72654d530822567fb1d5d1ba7772827ca64fc6cb2848b5a5595db0077d0b05ec62924a26881c2ad5ee5690ee8987f665cab462e4544d4a4a54c176af216789eacb19c5ba393175ed2d468ff16ea2458294eceb8979da1fccf6856f27cb8c34685dcf789f39ef68854995aa92b98862b99707d9dcee9dc71fd7554663e2648276e670e9769baeeff8193b466c5cce2cebd7d917f9c7cb41fe4330cf2a216546fcd6b722d7193b7a9b39ceddbb0a363613ab276faca70ae2942980a0d359c4e5c30aad691173f2ca8a74d360661b91c3fe502ed129f2145bc3a288b6ec50a5d6affe49275e7170125487c388a136d71313c6b7e1a1e72afaa5b611cf0a0a79e783a7ebbc5352aacc83697cf63232d12a2565b0106dc068dcf6e0a4f583e11140f303af306cbe239dbda8b2efe236721b8813fd2306533520698f1c9819597ba1138e5a6fb6ac15701a77f683de7afbc2ba3541dddb67b0f28aef4c70234ff461d8dbf0f94f7688c849e2486bfc7a91ae354a7c7b6f28a2c2aae78bb67629b4d6600e3b65a06183b18933c586285221c23ccd245ca2c1d783dae905cd66478a63dafe30146b0ea85e1b075dc9ad036af1e7272fc5550f76d09b7937764e77dc7516980419b7586d77c3189a5159d44b94490bec22e13146656bb776ed300a4d5e64e8bf12a3fb2a94b5ff9317292cbb02cf3c6de3ad6cd3f19fbfb488b55bad1df9744c052694d2398f8f44ae2a94c669855e42ee4a080fdf69240cb1d8f815d1ae86a49daa4a43583cb1cbd6e45b5e2423f6faa098f1c7a6492941350ee4b342de0c73a11062c19fbb22177a8217dbfcf32a66a6d4211c19d24b49d007327888341f8395e6fdbd2fa45fc107e795d1710828a2bb22972c2d22a7934fe8077f7e10c894a2048c5378b10178793ffd2019a114701fb9eeaccd054aaa75a88fdb0b8d5692df96d336c5b12078f73c098c0cf8c6eaba8e452d7555a17684943938d24eb6a0cfff4577fc1a3023c92fd7d9950c1e72e108551f8d4e195ffd33be57c17ab9f462bd90203f7ea6fde24aff3739353d00b9da6e3d28d7e5cebd388e73b8d8865f45fde8e66f2a6e9d7093ec92c1c921e3f9ac3176666210301808ef7a897433c753613dd299543c8572cd6abc1421dc57cd90bfa506fbc568b7278a310d226c1d581108041c2e0db1e26ce5f7c70996ee14883b5c6656cdf12285fcff5ea3dee7baf97eee9f834f417c03d95c9eeee42ff0554ed9b30f495544e9f9d6c575b8590e7a4634e9d6d59676855b2308920eec9af639acbc07ce9991d3bb9e33a7fc8426cccf5fc645fccd88efa4529641cf336e4647c6c0b4fe909b46316b65e8e8c03a30160e77589d0c72fe26e86e1ccb3210f7a10721e4a6e699f2e4ad39a4488313428c06a9c114a0874f5580938f9f1697239413fa288474632ad462113866526bc883cd582f34ae7bc1a27f5ae0084cb45473b981e861e4ece77062a859cd3b9a511aa83a7ffd6289ec5383c3946055a984a8a23d51ca2ab57d1bc820fde1effbc9ba535a058edc91e4e38c014a8f50cac4e5f9a4dce396673e1903f13b569b15a95a75ecf69a7c1cb64b6685bce5cc31c3085e57c490001a7418aa0a259382da3a98a61565db1f3a9f471df9bb7059f1ff42ed7e12170ba45a389e011505affcfdb7d968df1f491ca9aeb7925e0ea35848e8e932128eccd5ba682c87b5c465196b03766b207505783118a2738e8aa4e3d15c43301eebedf57a7ea4f936b16e369c4a1ab9225c20259713fd4f4e14673d01ef590cf36b8a48172b610ee9227ead6b5959c51ba07bb06cb7e15ad82220e0b0f6f823faa6b843b5f975ce1180d74bfacb70d3b20c2a14c3c0066fc7cbae44f071a8f754defa95474314fe7c89c31239a5e721e44ead75b4b454fd5efd9bca6906e32b40d44c151f589b6587a9d54db3ab55241279532953d1dacd131f5047461fc0d7fc27b2840c30d4dab884392e6f95a2b3944903cd84302ccce77d60129ae09ea1dbcd9347c5d1543f66d8c86afa045e1b8cc4fa778a5200a797031a3737591e2f36d041ce18a80d5a7145c99cd737886d81540bd0af17071b6be5b5ba6844b686b475b9ee7107dd182ce8981f2906461a05b56172509d863707224c647049072187bceef3e03646a54bd23b340c61b59f08c1f379ec69c1a2de1c90c4f4321a0e", 0x1000}], 0x2}}], 0x2, 0xc822) 23:16:48 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:48 executing program 0: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x1b, &(0x7f00000000c0)={@dev, 0x1}, 0x20) 23:16:48 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = openat$selinux_commit_pending_bools(0xffffffffffffff9c, &(0x7f0000000000)='/selinux/commit_pending_bools\x00', 0x1, 0x0) ioctl$EVIOCGKEYCODE(r0, 0x80084504, &(0x7f0000000040)=""/151) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) 23:16:48 executing program 0: r0 = socket$unix(0x1, 0x1, 0x0) r1 = socket$unix(0x1, 0x1, 0x0) r2 = dup2(r1, r0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$FIONREAD(r2, 0x5421, &(0x7f0000000000)) 23:16:48 executing program 0: r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r0, 0x1, 0x0, 0x80000001) write$cgroup_type(r0, &(0x7f00000009c0)='threaded\x00', 0xd4b9afd) r1 = open$dir(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lseek(r1, 0x0, 0x4) setsockopt$inet6_MRT6_ADD_MFC(0xffffffffffffffff, 0x29, 0xcc, &(0x7f00000000c0)={{0xa, 0x4e22, 0x800, @dev={0xfe, 0x80, [], 0xf}, 0x8000000}, {0xa, 0x4e22, 0x8, @remote, 0x8}, 0x7, [0x4, 0x7, 0x3, 0x2, 0x1ff, 0x7fffffff, 0x0, 0x13b]}, 0x5c) 23:16:48 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') socket$inet_udp(0x2, 0x2, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) 23:16:48 executing program 4: prctl$PR_GET_UNALIGN(0x5, &(0x7f0000000100)) socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000)='\x00'}, 0x30) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) r1 = open(&(0x7f00000001c0)='./file0\x00', 0x0, 0x20) setsockopt$inet_tcp_TCP_CONGESTION(r1, 0x6, 0xd, &(0x7f0000000200)='cdg\x00', 0x4) ptrace$cont(0x7, r0, 0x0, 0x0) r2 = gettid() ptrace$setopts(0x4206, r2, 0x0, 0x0) tkill(r2, 0x39) ptrace$setregs(0xd, r2, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r2, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) dup(r3) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f0000000080)={0x0}, &(0x7f00000000c0)=0xc) r5 = syz_open_procfs(r4, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r5, 0x203ffffd, 0x0) 23:16:52 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000000)=ANY=[], 0x0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:52 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='nenector\x00') ioctl$sock_SIOCSIFBR(r0, 0x8941, &(0x7f0000000000)=@generic={0x2, 0x7, 0xffffffffffffff76}) lseek(r0, 0x203ffffd, 0x0) 23:16:52 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = dup(r3) ioctl$PERF_EVENT_IOC_ENABLE(r4, 0x8912, 0x400200) ioctl$IOC_PR_PREEMPT_ABORT(r4, 0x401870cc, &(0x7f0000000000)={0x1, 0x6, 0x3, 0x1}) recvfrom(r4, &(0x7f0000000040)=""/184, 0x100000048, 0x40012500, 0x0, 0xffffffffffffff49) 23:16:52 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) r3 = socket(0x10, 0x803, 0x0) sendmsg$NBD_CMD_DISCONNECT(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={0x0}}, 0x0) getsockname$packet(r3, &(0x7f0000000100)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000200)=0x14) socket$nl_route(0x10, 0x3, 0x0) socket$netlink(0x10, 0x3, 0x0) socket(0x10, 0x803, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) r6 = dup(r5) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x8912, 0x400200) sendmsg$nl_route(r2, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000380)=ANY=[@ANYBLOB="3c0000001000850600000000000000a642000000", @ANYRES32=r4, @ANYBLOB="fe000000000000001c0012000c000100626f6e64000000000c0002000800010004000000"], 0x3c}}, 0x0) sendmsg$nl_route(r1, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) sendmsg$nl_route(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000080)=@newlink={0x3c, 0x10, 0xffffff1f, 0x0, 0x0, {}, [@IFLA_LINKINFO={0x14, 0x12, @bridge={{0xc, 0x1, 'bridge\x00'}, {0x4}}}, @IFLA_MASTER={0x8, 0xa, r4}]}, 0x3c}}, 0x0) 23:16:52 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x0, @perf_bp={&(0x7f0000000000), 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:52 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x4, &(0x7f0000ffd000/0x1000)=nil) setxattr$trusted_overlay_upper(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='trusted.overlay.upper\x00', &(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x54, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) bind$unix(0xffffffffffffffff, &(0x7f0000000080)=@file={0x0, './file0\x00'}, 0x6e) 23:16:52 executing program 0: r0 = socket(0x10, 0x2, 0x0) write(r0, &(0x7f0000000180)="1c0000001a009b8a14000020ff0000adf87e28000000000000000000", 0x1c) 23:16:52 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:52 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000040)='hugetlb.2MB.usage_in_bytes\x00', 0x0, 0x0) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000340)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0xfe7eb7b8d419ffeb) 23:16:52 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:53 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/ip6_mr_cache\x00') r1 = syz_genetlink_get_family_id$ipvs(0x0) sendmsg$IPVS_CMD_DEL_DAEMON(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000002c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="7000a400000000000000", @ANYRES16=r1, @ANYBLOB="00002dbd7000fedbdf250a00000008000600faffffff3c00020008000e004e2100000800090000000000080004005f2e000008000b0000000000080006000100010008000700ff00000008000e004e240000080006000800000008000500000000000800050002000000"], 0x70}}, 0x0) sendmsg$IPVS_CMD_GET_INFO(r0, &(0x7f00000000c0)={&(0x7f0000000040), 0xc, &(0x7f0000000080)={&(0x7f0000000240)={0xcc, r1, 0x100, 0x70bd2a, 0x25dfdbfb, {}, [@IPVS_CMD_ATTR_SERVICE={0x2c, 0x1, [@IPVS_SVC_ATTR_NETMASK={0x8, 0x9, 0x3a}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0x2}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xe5c}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x44, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ip6gre0\x00'}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x3}, @IPVS_DAEMON_ATTR_MCAST_TTL={0x8, 0x8, 0x1}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x4}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth0_to_bond\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x7}, @IPVS_CMD_ATTR_DAEMON={0x18, 0x3, [@IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'lo\x00'}]}, @IPVS_CMD_ATTR_DAEMON={0x28, 0x3, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @loopback}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'caif0\x00'}, @IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x8, 0x4, 0x7}]}]}, 0xcc}, 0x1, 0x0, 0x0, 0x8000}, 0x4840) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='oom_score_adj\x00') lseek(r2, 0x203ffffd, 0x0) 23:16:53 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) fallocate(r0, 0x34, 0x80000000, 0x6) r4 = socket(0x100000000018, 0x1, 0x40) connect(r4, &(0x7f0000000000)=@ll={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, 0xe) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000000100)='fou\x00') sendmsg$FOU_CMD_ADD(r4, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4040080}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x60, r5, 0x1, 0x70bd28, 0x25dfdbfe, {}, [@FOU_ATTR_PEER_V6={0x14, 0x9, @dev={0xfe, 0x80, [], 0x28}}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_TYPE={0x8}, @FOU_ATTR_AF={0x8, 0x2, 0xa}, @FOU_ATTR_PEER_V4={0x8, 0x8, @local}, @FOU_ATTR_PEER_V4={0x8, 0x8, @remote}, @FOU_ATTR_PEER_PORT={0x8, 0xa, 0x4e24}, @FOU_ATTR_TYPE={0x8, 0x4, 0x2}]}, 0x60}, 0x1, 0x0, 0x0, 0x5f0ecee700118b88}, 0x2800a041) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000240)=""/178, 0xb2, 0x40012500, 0x0, 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r3) 23:16:53 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup(r1) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ioctl$TIOCGPTPEER(r2, 0x5441, 0x7) lseek(r0, 0x203ffffd, 0x0) 23:16:53 executing program 3: r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) prctl$PR_GET_CHILD_SUBREAPER(0x25) write$binfmt_elf64(r1, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r1, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000040)=""/47, &(0x7f0000000100)=0x2f) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r4, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r5 = socket(0x100000000018, 0x0, 0x4) dup3(r4, r5, 0x0) recvfrom(0xffffffffffffffff, &(0x7f0000000480)=""/184, 0xfffffffffffffe47, 0x40012500, 0x0, 0xfffffffffffffd4e) syz_open_dev$loop(&(0x7f0000000180)='#\x00|\x00', 0x800100820000, 0x313001) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, [], [{0x7, 0x5, 0x8, 0x0, 0x8, 0x8}, {0x4, 0x2440, 0x3, 0xfff, 0x200, 0x5}], [[], [], [], []]}) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r6, r6, 0x0, 0x8800000) ioctl$FS_IOC_SETVERSION(r6, 0x40087602, &(0x7f0000000140)=0x2) 23:16:53 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={0x0, 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:16:53 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) bpf$MAP_CREATE(0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000100)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x10022, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x80}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = socket$packet(0x11, 0x2, 0x300) setsockopt$packet_tx_ring(r1, 0x107, 0xd, &(0x7f0000000100)=@req3={0x10000, 0x100000001, 0x10000, 0x1}, 0x1c) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) mmap(&(0x7f0000ff0000/0x10000)=nil, 0x10000, 0x2, 0x11053, r3, 0x0) r4 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='stat\x00') preadv(r4, &(0x7f0000000500), 0x37d, 0x0) pipe(0x0) write(0xffffffffffffffff, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000240)) lseek(r0, 0x203ffffd, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000040)=0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r7 = dup(r6) ioctl$PERF_EVENT_IOC_ENABLE(r7, 0x8912, 0x400200) perf_event_open(&(0x7f00000003c0)={0x6, 0x70, 0x89, 0x27, 0x0, 0x6, 0x0, 0x4, 0x10010, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x3, @perf_bp={&(0x7f0000000000), 0x911f9a2a2f829dea}, 0x3, 0x9, 0xffff8001, 0x6, 0xffffffff, 0xbd, 0x6}, r5, 0xb, r7, 0x9) 23:16:53 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) socketpair(0x8, 0x5, 0x6, &(0x7f00000003c0)={0xffffffffffffffff}) bind$netlink(r2, &(0x7f0000000400)={0x10, 0x0, 0x25dfdbfc, 0x1000}, 0xc) r3 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r3, r3, 0x0, 0x8800000) mmap(&(0x7f0000984000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0xffffd000) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) r5 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r5, r5, 0x0, 0x8800000) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000000)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socket$netlink(0x10, 0x3, 0x13) r6 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r6, r6, 0x0, 0x8800000) socket$inet6_udplite(0xa, 0x2, 0x88) r7 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r7, r7, 0x0, 0x8800000) r8 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r8, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) unshare(0x10000) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffffffffffe1, 0x40012500, 0x0, 0xffffffffffffff49) r9 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) umount2(&(0x7f0000000100)='./file0\x00', 0xa) sendfile(r9, r9, 0x0, 0x8800000) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r9, 0x800c6613, &(0x7f0000000140)=@v2={0x2, @aes128, 0x1, [], "f7021bce00"}) [ 576.310340] audit: type=1400 audit(1574723813.592:27): avc: denied { map_create } for pid=32293 comm="syz-executor.4" scontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tcontext=unconfined_u:system_r:insmod_t:s0-s0:c0.c1023 tclass=bpf permissive=1 23:16:53 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xb8, 0x40012542, 0x0, 0x0) 23:16:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:16:54 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) mprotect(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x1000, 0x2, &(0x7f0000fff000/0x1000)=nil) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) prctl$PR_GET_NAME(0x10, &(0x7f0000000000)=""/3) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000380)='ne\xff\x03\x00\x00\x00\x8dablk\xf9_matches\x00f\x8e\xef\xd9!\x8e\x0e\xe5v\xa9\xa0H\x9f\x83\"\xaf\xe2\xd1}\x9f\xb7\x9bf\x97\x82\xf3\xa2^\xc1(\x89\xc6\xb5\xeb\x19W\xb8\xec\xab\xd0\x8bVb6\x9c\xd7\xdc\xc8\rC1\xbb\xaf\xaflGs\rp\xe3u\x96\x82s{\xa2\xb6\xf4\xdf\xab\xc5\xce\'\xa7\xacN)5d~\xb7\xc2N\x18\xafT-E\x96\xcd[\x9e\xf1\xfdU\xca\a\xf8c\x82\xc9D\x84\xc3\xe7R\x06\xc9~J\\G\xaf\x80I\xcb\x9f\x06I\x9b\x116\x81\b\x86\xa2X\x14^\xe1\x9eD3\xc5\x82\xda\x85eZ\xa7o\x0e\x99\x99Y0L\x01\x1c\x96\x1c\xe6o\xfa\xbd\x01\xa3|V\x8b\xcd\vU\xe4\xbe7\xea=\xc9G%\xb0\x1a') lseek(r1, 0x203ffffd, 0x0) 23:16:54 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:17:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:17:00 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x4001fe) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) r6 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x100) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r6, 0x6, 0x14, &(0x7f0000000240), 0x4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) r7 = socket$nl_route(0x10, 0x3, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) getsockopt$IP6T_SO_GET_ENTRIES(r9, 0x29, 0x41, &(0x7f0000000300)={'raw\x00', 0x56, "e58bc337cb15ba96b7c48f930417814f29a3f15393a4f854cecb6080a7d58ea2d60208755036041d3f53b4415202ec7d8c1ce3810c8392730ed8fb9efee704230e7bb2aad7baa6278b845c09f42a7faa35043f17c0c2"}, &(0x7f0000000380)=0x7a) r10 = socket(0x11, 0x800000003, 0x0) bind(r10, &(0x7f0000000080)=@generic={0x11, "0000010000000000080044944eeba71a4976e252922cb18f6e2e2aba000000012e0b3836005404b0e0301a4ce875f2e3ff5f163ee340b7679500800000000000000101013c5811039e15775027ecce66fd792bbf0e5bf5ff1b0816f3f6db1c00010000000000000049740000000000000006ad8e5ecc326d3a09ffc2c654"}, 0x80) getsockname$packet(r10, &(0x7f0000000040)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @dev}, &(0x7f0000000140)=0x14) r12 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r12, r12, 0x0, 0x8800000) r13 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r13, r13, 0x0, 0x8800000) r14 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r14, r14, 0x0, 0x8800000) r15 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r15, r15, 0x0, 0x8800000) sendmsg$nl_route_sched(r7, &(0x7f0000000280)={0x0, 0xfffffffffffffcea, &(0x7f00000002c0)={&(0x7f0000000480)=ANY=[]}, 0x1, 0x0, 0x0, 0x24006004}, 0x0) sendmsg$nl_route_sched(0xffffffffffffffff, &(0x7f0000000640)={&(0x7f0000000580)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)=ANY=[@ANYBLOB="300000006600000829bd70000000", @ANYRES32=r11, @ANYBLOB="f1ff02000200e0ff0000000008eb0a0005000000"], 0x30}, 0x1, 0x0, 0x0, 0x8078}, 0x0) sendmsg(r5, &(0x7f00000001c0)={&(0x7f0000000100)=@can={0x1d, r11}, 0x80, &(0x7f0000000180)=[{}], 0x384, &(0x7f0000000580)}, 0x840) 23:17:00 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) 23:17:00 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={0x0, 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:17:00 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) ioctl$BLKROGET(r3, 0x125e, &(0x7f0000000000)) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:17:00 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) ioctl$RTC_PLL_GET(r0, 0x80207011, &(0x7f0000000000)) lseek(r0, 0x203ffffd, 0x0) 23:17:00 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d", 0x7c}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:17:00 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) sendfile(r1, r0, &(0x7f0000000400)=0xfffffffffffffffe, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r2 = socket$inet(0x2, 0x1, 0x0) r3 = socket$inet(0x2, 0x1, 0x0) bind$inet(r3, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r3, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r4 = socket(0x100000000018, 0x0, 0x4) dup3(r3, r4, 0x0) r5 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000540)='/proc/self/net/pfkey\x00', 0x40000, 0x0) bind$inet(r5, &(0x7f00000000c0)={0x2, 0x4e23, @remote}, 0xffffffffffffffef) sendto$inet(r2, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) prctl$PR_SET_SECCOMP(0x16, 0x1, &(0x7f0000000380)={0x2, &(0x7f00000001c0)=[{0x1, 0xa6, 0x2, 0x5}, {0x2, 0x9, 0x7, 0x7}]}) r6 = socket(0x100000000018, 0x0, 0x4) rmdir(&(0x7f00000003c0)='./file0\x00') dup3(r2, r6, 0x0) getsockopt$inet_tcp_int(r2, 0x6, 0x19, &(0x7f00000000c0), &(0x7f0000000100)=0x4) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r7 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r7, 0x203ffffd, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r9 = dup(r8) ioctl$PERF_EVENT_IOC_ENABLE(r9, 0x8912, 0x400200) r10 = accept4$packet(r9, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @broadcast}, &(0x7f0000000040)=0x14, 0x80000) r12 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r12, r12, 0x0, 0x8800000) r13 = dup2(r10, r12) ioctl$EVIOCGABS3F(r13, 0x8018457f, &(0x7f0000000480)=""/156) ioctl$sock_inet6_SIOCDIFADDR(0xffffffffffffffff, 0x8936, &(0x7f0000000080)={@dev={0xfe, 0x80, [], 0x11}, 0x6, r11}) 23:17:01 executing program 5: fallocate(0xffffffffffffffff, 0x0, 0x0, 0x1) write(0xffffffffffffffff, 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000001000), 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) r4 = socket$inet(0x2, 0x1, 0x0) bind$inet(r4, &(0x7f00000000c0)={0x2, 0x4e23, @rand_addr=0x6}, 0x10) sendto$inet(r4, 0x0, 0xfffffffffffffec1, 0xfffffffffbffffb9, &(0x7f0000000080)={0x2, 0x4e23, @local}, 0x10) r5 = socket(0x100000000018, 0x0, 0x4) dup3(r4, r5, 0x0) getpeername$unix(r5, &(0x7f0000000100), &(0x7f0000000000)=0x6e) 23:17:01 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:17:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x20000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/173, 0x543c5113, 0x100, 0x0, 0xffffffffffffff49) 23:17:01 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203ffffd, 0x0) lseek(0xffffffffffffffff, 0xdcea, 0x0) 23:17:01 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) fstat(r1, &(0x7f0000000000)) sendmsg(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)=@nfc={0x27, 0x1, 0x2, 0x4}, 0x80, &(0x7f0000001780)=[{&(0x7f00000003c0)="d42cc7d1ad8064bd5d53c63680bb35d895a53c2fccfcda22cbfcc394de2f77c3612d1bb751be6b27a6400e88791a1be7f56ea7664ebc94161a9c5368ebcf820dc1cadf5e1b72de7a4825e354e2f726bd1f02e7d5a9084d4be404e82130f3064bdb48706791660b6578518fa1701b6f986bf663089c5740", 0x77}, {&(0x7f0000000440)="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", 0x1000}, {&(0x7f0000000100)="24c8b396c1", 0x5}, {&(0x7f0000001440)="be75714ad9c7896b48326a7d707db1142069f7cab364f2d626da07dd88c0b5955af98c38cec4f82d92224c0ef0b58764631065caa0abc9dd3b3eb8f376350e0c5297988f2d7f2645707e3af924f7ff1bb40286481c43d33e5e4125844761e86b1420ad357b5fdf534b13354cf34cc23edb128fbf0b8a0d4532dcdb676168f1", 0x7f}, {&(0x7f00000014c0)="b82d6f736028dcc63d5f704beaa3f1ad353020e6a8ad83f801b83021d500aa3acfdff9c18e310215c730a5815b3eb347117e9c7acab104af6946b3938148e7074579c43f225df3301831831b2d530c8a06455cab4d4c5eeaa6d5e33d82c13e3dda6f79b200df1dd3c7f930956bd51bd79e9c9d209201e46894b0466de341320c3c692414b691dac69f261fd8e5f460dfb55e950fc02ee2c509d0232d08afed04cfe5e85cafd9fc49f4769e616bc646ef8c7ff29627bcf0e6faf73bad7e1e006a9ce2a039fe996ec489ba1b420579a96fe6d2d79cea3d0b271ebbefc4fbd3", 0xde}, {&(0x7f00000015c0)="a0cc1792f8344dcdd84d463fea10b92d2e5603338a757694e969897840431ea30f41621c00abc03fa2e77782d603947b68203652aab6549fc260f6ca61f0fe51311312cdc4d35bbdf730ec3c7af706809871b645ed2306394720d9a1bef7e1b73fc20db53ff98e9198dfada1dd346d9d28f1b418fd9f840af0a0a3b183ebda1de2c473fdc9bcb5f15b63d2320ef7caf6bed205f9e2697c275229aa065dce2cae7344d683964365e0a18aaccca85372c975f83a6eb9079b0e187b3541ae7f289327dd214078df4b73850035c424c41c48f223f8a081feeeca61cbace84e8033b6c4a7bc8c5a93519d0d548add68", 0xed}, {&(0x7f00000016c0)="73e0753f2361215b4ad7c7c2c3ee1ab9bf996008326f75a58f38a0d81b3d88d0a104beedb8d33c2b559903db9ae49cf2fbf34e30c6adc184849ef0eedb51a9e843ba0b40583e63b3b6d7f584d56e9b23a9e7477bc328f04dc4ba60127f6377466e75e7502b05f9df05581958509aa53cfcf85109900058522c94e3187cd187a1c2cad052e71bd4f5f300d0af79bbec9a0c9b51dcf4c3dce37a3b8a47a331210b3ec96d2181c1be6e", 0xa8}], 0x7, &(0x7f0000001800)=[{0x110, 0x104, 0x7, "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"}, {0xe0, 0x84, 0x20, "e3c9601ba6c54e59023178cca67544e19c5c1f6d58a24e8115d6468a40d7e829214dc1dd42cc1836e6f4106d35e52c742856683263d0f32a5453e18529f592eecd575c5ec79e06413a7c1911a4fc944f30d492142a68d002d5a2ca8c9147e01f823e843107f64f0fb5f81ac3b0646b3b4a36cc55700fd26e366bff47fe826514e267fe91b19e3596d8cc287e75a05349554034c3a11e759e734bb50d4a0e86e1beee616cffbcdc07d07811f597bba05d47fe14075c4d04f4fd90d7e4dd61d0702b55f21bd273bfb3c1a4"}, {0xa0, 0x11, 0x3, "408c19e0aca3e9750583b850ee653f0e615c124ed2ee57154e31e03c02beb22483962759a4838450aee8f1c706a0c237edbb840eb867094e6f1fc6586db0564fb2555d0db0bef115683d1fe93daa896a560bc9465bef50a416bc5a5d2f1ec1dc13c96f4bf87d885d953394319f8452b5e9c2755ebefcd2dbb67748ddc0fd9afe72e748ed968db7392e"}, {0xa8, 0x2995b3b3147b4989, 0x1, "86fb90b96ecd384d9e583a30828a4d6c39b2a4c0b926a07fdfae34f457c3c2caf585c6b26e29a2b5895c8a5cc0c61fb5f7a37968259419fe5f8f37c7752f3045161efbeff7bbe90306d5c60819f434b252dd4402c04de361eb38fc6e435994252e27f07c990ef0d06a5ec27b746ee070fa49bc5922e155e2eb519f31f94b4afebb922f63910d350a93145cd67f2b0b2b411c9c6abb2d25"}, {0xb8, 0x10d, 0x48e, "c5fc77cfe6263c0abfe9d0a6bcd0131643b1c585492f5de4f411131ad31a8b8afe2044d00ea832c6cde834c903a25edb6b779d4c2bb10a3fb20de051e5b42ae0e852e4c8d1782e349e61831771c7b5a51693eea20e579d2febb4ee62da6e53954e487722713405ecf50c77d780af1cdd7a4c0f0566d53e2e40f0c03399aedafa29eb897173090288d5ddedb75de4521e0fcdf041bbcb970675d16b1b4946d34dfb"}, {0x38, 0x0, 0x9d, "36a13a7329c2df53168abf22dda5981d8d287bcf16bef3335a6f686d8a58178b4209587b2ac0"}, {0xb0, 0xc3, 0x1ee, "e5d5e874c3c7cb9f649a7ec38972137b432d4314b111df48525f93e1ceea8e99e7e0332a1af7d9a5d60fd90a93f577d370e9fdd5bdb70348200f434f0ea9101d098ed81cbb232018f090bba8795cfe5035a0670cb264d6356313d2b058858b0966eab9ad19ea21c037d46b6f019ef95e0af38df864ad53f0d790b5388622acdc8b10b63c68662824c6d838d87b2ec742e8079d8ce93dbbf7430d"}, {0x10, 0x10e, 0x1ff}, {0x50, 0x108, 0x8, "7f4e6267f9d38375af6d7a5c7271e311e71192994772b7ef1007ac7661388d460d497049de4ac14ee1a16f969da1684fc72b2f554d9c52f477821edf4a"}], 0x538}, 0x40010) lseek(r0, 0x203ffffd, 0x0) 23:17:01 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) sendmmsg$unix(r1, &(0x7f00000001c0)=[{&(0x7f0000000100)=@abs={0x1, 0x0, 0x4e20}, 0x6e, &(0x7f0000000180)=[{&(0x7f0000000240)="f7fd2eea550c64724d040f1fb12e3a5816269022189e773d16250bf51b095e009d8d8b60a6dac63fc27cc7a0a4663e63765d5c426f020a22c88fcea649dd306deb89f482bbd9c29967d11c738320f3ad088c1228bd49f944dfa5d77872824e671461c9382df2d84564271edc33afde6cda610f76405a85e26bf6e4a8466dd7c598752bd426c50baad66fa3f9775622d573987dca668842b6d52bfdae2724311c36e07d2f308346d2ffc5674fe393b3cc288b6e6d70e1", 0xb6}, {&(0x7f0000000000)="a39a9a3e66", 0x5}], 0x2, 0x0, 0x0, 0x9c3deda792c4902c}], 0x1, 0xe90b6c32d9d02a6a) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) ioctl$TCGETX(r3, 0x5432, &(0x7f0000000300)) open(0x0, 0x250800, 0x0) r4 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r4, r4, 0x0, 0x8800000) fcntl$getown(r4, 0x9) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) 23:17:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) 23:17:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r0, 0x203bfffd, 0x0) 23:17:09 executing program 3: perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x80000000001, 0x0, &(0x7f0000000540)={0xffffffffffffffff, 0xffffffffffffffff}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x10, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000380)=ANY=[], 0x84f0) write$binfmt_misc(r0, &(0x7f00000000c0)=ANY=[], 0x7fffffff) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r3 = dup(r2) ioctl$PERF_EVENT_IOC_ENABLE(r3, 0x8912, 0x400200) syz_genetlink_get_family_id$devlink(&(0x7f0000000200)='devlink\x00') sendmsg$DEVLINK_CMD_GET(0xffffffffffffffff, 0x0, 0x0) open(0x0, 0x250800, 0x0) open(0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) recvfrom(r1, &(0x7f0000000040)=""/184, 0xffffffc9, 0x40012500, 0x0, 0xffffffffffffff49) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r5 = dup(r4) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) getsockopt$netlink(r5, 0x10e, 0x2, &(0x7f0000000000)=""/56, &(0x7f0000000100)=0x38) 23:17:09 executing program 1: fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, 0x0) r0 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc, 0x14d5a7caeceeaa64, @perf_bp={0x0, 0x8}, 0x20008, 0x0, 0x0, 0x8, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) munmap(&(0x7f000001d000/0x4000)=nil, 0x4000) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ptmx\x00', 0x3d, 0x0) write$binfmt_aout(r1, &(0x7f00000000c0)=ANY=[], 0x2ff2c38c) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f0000000080)=0x0) fcntl$setown(r2, 0x8, r3) r4 = syz_open_pts(r1, 0x0) ioctl$KDDELIO(0xffffffffffffffff, 0x4b35, 0x7) ioctl$TIOCLINUX6(r1, 0x541c, &(0x7f0000000040)) r5 = accept4$unix(r0, &(0x7f0000000140), &(0x7f00000000c0)=0x6e, 0xc0800) bind$unix(r5, &(0x7f00000001c0)=@file={0x2, './file0\x00'}, 0x6e) dup3(r4, r1, 0x0) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000100)={0xffffffffffffffff, 0xffffffffffffffff}) recvmsg(r6, &(0x7f0000005700)={0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd, 0xfffffffffffffda7}, 0x0) ioctl$FS_IOC_REMOVE_ENCRYPTION_KEY_ALL_USERS(r6, 0xc0406619, 0x0) 23:17:09 executing program 5: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700), 0x0, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:17:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d", 0x7c}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:17:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r1 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r1, 0x203ffffd, 0x0) r2 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r2, r2, 0x0, 0x8800000) r3 = dup3(r2, r0, 0x80000) r4 = syz_open_dev$mice(&(0x7f0000000000)='/dev/input/mice\x00', 0x0, 0x20001) ioctl$KDGKBTYPE(r4, 0x4b33, &(0x7f0000000040)) ioctl$RTC_UIE_ON(r3, 0x7003) r5 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0)='TIPC\x00') sendmsg$TIPC_CMD_SHOW_PORTS(r4, &(0x7f00000003c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x820220}, 0xc, &(0x7f00000001c0)={&(0x7f0000000100)={0x1c, r5, 0x0, 0x70bd2b, 0x25dfdbfe, {}, [""]}, 0x1c}, 0x1, 0x0, 0x0, 0x40000080}, 0x10) 23:17:09 executing program 2: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{&(0x7f0000000600)="9825119c9158015b6e9592031697c0f81cf0f92102e68c421ba0a4f0e9ca8e79f2d051035ed17041f70323cf8c536d0d8e23d4187246190b0dd9ec39bf4a7d653afd22bbbed51b934516239acd1c9562e99bad7854322fb09d161c5ed8b797d798901f72c3b564b728ab3183f08e80294ec970369b555080c9fdfe4d", 0x7c}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) ioctl$BLKIOMIN(0xffffffffffffffff, 0x1278, &(0x7f0000000200)) 23:17:09 executing program 0: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) mount$bpf(0x20000000, &(0x7f00000000c0)='./file0\x00', 0x0, 0x2001001, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, &(0x7f0000000100)) perf_event_open(&(0x7f0000000280)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x20, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pivot_root(&(0x7f0000000140)='./file0\x00', &(0x7f0000000100)='./file0\x00') writev(0xffffffffffffffff, &(0x7f0000000040), 0x0) unshare(0x40000000) r0 = openat$vga_arbiter(0xffffffffffffff9c, &(0x7f0000000540)='/dev/vga_arbiter\x00', 0x4e0c00, 0x0) sendmsg(r0, &(0x7f0000000940)={&(0x7f0000000580)=@ethernet={0x6}, 0x80, &(0x7f0000000700)=[{0x0}], 0x1, &(0x7f0000000740)=[{0xe0, 0x10b, 0x3, "2283262fbb128ec81b716364d4aa13a13f924170b40deff8316af3eb4998265649f6f3380d90b359a661f8e5cbeae2fa1826d51f471b93aa8c5703f6cceda71127beec2d49d9e871984cfbf7b06f8bde25221575f20d4ac4feea96f784b38bd0c067dd57d1dcea2436e35ee0529b2c55696bc4f9a4571ae8a6bceb2f55eb2f785c2fd640f97f31913ef99b71416087b326c90f88d0e5fec48adf4b931c62db9df2d1d92a0fad2bc6256ecc22768afe38547f3567dc0adabf3c817419365fa6f16c69bb60832b67066b46fcc189ee30f1"}, {0xe8, 0x6, 0x0, "f6623da17f58232fcc313e81ed976702967f9dbaac099a2417f832cb919400f96a6fbf63a6e0c543e8c806272ab326d3125e9acb8a7b55ddc35f5e8e1fc8875dedb86ba033928754dcb3359b72fe96ff8493acb7aa22f31f557da0870e4ca4ef3c03cf1585210b42f1e46e132d388a15ea7e98afac2701c02825b77e9bb0010243931cc20c1c36267d840b8511615cbfe3b2e87ed48db74caaf8f775cdd3eec55d51b0a39f8a27d9acbcfdc727a63c14ca79532a04a1bf753be41ae6b8f0dbbc5ed66f641b4589415c549ff480cce11f42352ecada30"}, {0x10, 0x119, 0x3}], 0x1d8}, 0x20c4010) openat$selinux_avc_cache_threshold(0xffffffffffffff9c, 0x0, 0x2, 0x0) epoll_create(0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x0, 0xfffffffffffffffd}, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$loop(0x0, 0x0, 0x0) fallocate(0xffffffffffffffff, 0x15, 0x1005, 0x3) mmap(&(0x7f0000000000/0xb36000)=nil, 0xb36000, 0x300000a, 0x8031, 0xffffffffffffffff, 0x0) r1 = getuid() syz_mount_image$f2fs(&(0x7f0000000040)='f2fs\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000b40)=[{&(0x7f0000000180)="0440f513abb0c54964dfb1d4e1096826ab2f28207e8ec93589fa08cf71de0f0bf5135511a3b3d9618ae99b23d86fb360a53d1e002dfd4e8bd82f930425d5944f23749f022212b8a1fc98c6335a94cd203cefcf73d67b1f1e4bdb3aa87f853ad5f12222affefd28988d45d3c38662aac01234b993c891665e75e590", 0x7b, 0x4}, {&(0x7f0000000240)="4646b6226466173d30634bae78973292fa7d42cc4fab2d4b0ed51e84ab85b788abcf7335e6aa283b939eb8b1fcf9f4d79071b4fe400a9666", 0x38, 0x10000}, {&(0x7f0000000340)='XQ', 0x2}, {&(0x7f0000000380)="40689eb74f62e9b97eb77717c6e8b99b9b98ac7953542c5042e7dd9e9700deec662db2b2dab52df7358639ec00af1220f2721dfde3048f13b7d0437696eaeeebdbbe35", 0x43, 0x7}, {&(0x7f0000000980)="fb5865c6bb4ec7b3e39335595aef46ec5aebac14f84124f01377e800ed154e2428f398ea908d90412a13e4d0a5246b73f91015c65f85aeedc4da7485c57fdaf8081ade9d181e578a61fe5fbddc66dbd9129ebb05874443a49d3208bdb3b6b0f7679857f1ecb388c94b73c73a5f6cb99ca4c5f840700bd6ad6e874e72570ece14101dd2b871c2eba08b2b", 0x8a, 0x10000}, {&(0x7f00000004c0)="e4f530c83dda28253e97f7746271ea793ec0b4aafba2e1680705c9fbc9e8bea34613213dec88d15a0359b35953806ad0d152177a67e523c2d4734b153d9a2aff45bd4652e742a571c921ff3f07442f4e3ba0691340da6e", 0x57, 0x96e}, {&(0x7f0000000400)="b3b4df67ad0118c9bc80ee732f19e5fa0634741d1b8a30406a0b9bbdcc318630a1eb1de9355ad562655e", 0x2a, 0x81}, {&(0x7f0000000a40)="26718af78eb8630bcfebd64080d3d34d2aaf72664a7ccd70c884784d7b54abb668c91b6a9870309f416dfa8f71fa28c0b10d2e87de5bf5a50e9b98c4d5f82253af92465dcf57698a58f282f315c4233b2af0b1e63a8c6908277cf48c4596e16afc91fcee75792186b50cb698eccb57b9c0c71b9c41db74335f9cbe928d75b60313cb4b48ee95f59dfaff2f4d01471754bbb415219acd5b62285ea433c7e2cd64dc6c09a04910d6beba97a800359dc5f2fe17b5bd52b51765e8c8750e1adccbfd6cfa2d1d99943526b26c6ae2d9591a1039ce46411491d17553e71a3a66de", 0xde, 0x3f}], 0x2100010, &(0x7f0000000c00)={[{@norecovery='norecovery'}, {@inline_xattr='inline_xattr'}], [{@fsmagic={'fsmagic', 0x3d, 0x1f}}, {@fowner_gt={'fowner>', r1}}, {@func={'func', 0x3d, 'FILE_MMAP'}}, {@smackfshat={'smackfshat', 0x3d, '\xb8+\\\''}}, {@fsuuid={'fsuuid', 0x3d, {[0x30, 0x37, 0x34, 0x36, 0x1cd68c3481042e3a, 0x62, 0x39], 0x2d, [0x35, 0x61, 0x33, 0x64], 0x2d, [0x12, 0x37, 0x31707129dac042c2, 0x37], 0x2d, [0x66, 0x6, 0x7c, 0x5e], 0x2d, [0x66, 0x34, 0x30, 0x30, 0x39, 0x0, 0x62, 0x35]}}}]}) sigaltstack(&(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000100)) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r2, 0x29, 0x40, &(0x7f0000000440)={'raw\x00'}, &(0x7f0000000100)=0x54) 23:17:09 executing program 4: r0 = socket$inet_tcp(0x2, 0x1, 0x0) bpf$BPF_TASK_FD_QUERY(0x14, &(0x7f0000000100)={0x0, 0xffffffffffffffff, 0x0, 0x3, &(0x7f00000000c0)='}-\x00', 0xffffffffffffffff}, 0x30) syz_open_procfs(r1, &(0x7f00000001c0)='n\x13\xe4\xc3?\xca\x12<\xd7\x17\xdf\xe2\xb7\x02\x8aet\x91\x149\xda\xbe\xd9/') setsockopt$inet_MCAST_LEAVE_GROUP(r0, 0x0, 0x2d, &(0x7f0000000000)={0x0, {{0x2, 0x4e22, @dev={0xac, 0x14, 0x14, 0x23}}}}, 0x88) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) 23:17:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) r1 = gettid() ptrace$setopts(0x4206, r1, 0x0, 0x0) tkill(r1, 0x39) ptrace$setregs(0xd, r1, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r1, 0x0, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000680)='fd/4\x00\xa7$\xbf\x05l\x81\x10\xf3\xc3\xb6om\xe8\v\x9e\xde\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd\a\x90\x97)0m6F\xc5\xeb\xa2\xe2\xb67\x98\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_M\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb3\x03\x00\x00\xf8-w\xee\x00\x00\x00\x00\x00\xbc.t\x96\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xbf\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\xb0\\\xec15\xd8Q\x83\xd0SW\x9a\xfe\xa4\xc5\xdb\x1f\xc7\xad`\x8fO-L\x0e\x00\xb8\x13s\x14;\"\xd6\"\xce\xdf%F\xc4a\xf7S\xb2+\xfc|(2\x04\x1d)n=[\xe3\x9c\xce\xe0\xea\xf8\xae\xa9%\xb1\x00\xbdQ\xda8\x9aT\xb72b9\xca\x06\x0e') lseek(r2, 0x203ffffd, 0x0) 23:17:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r0 = syz_open_procfs(0x0, &(0x7f0000000380)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x972\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xb0\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90v\xdb\xc2X\xf48\xd1kEu\x00\x00\x00\x00qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00W\xba\xb5\xd7\x86\xc4\xb5sQ3?\xec\bP\x8e\x9d4\xec1Tu\x8f\xf1\xda\xb9\xa2\xf7\x7f\x99{\xcd\xb3^\xf7/\xf3\xc0\xc7\xf8\xc0\xd8qv\xf5\xbf\xa1\xf9V)E\xc7\xf32S4\xba\a5\xf6\xad\xa0\xe3\xcd\xe7T>\x8d\x839\x8d>m\'\xe5\x19\x90\x18\xa6G\x17p\xe4\x9e\xf1+\xc5a\xf4\xf6.\xdf\x11\xc6\xdc]\xa1q\xa4{AF!\xf9\x9e^\xdd\x7f\xa0\xf1\xf7\x86\xf8\x9a9\nH\xf7PS\xa5\xea\x9bo\x9b@\xd5\x188\xc1\xde\xd0\x0e\xb8\xc7\xdf\xe6,\x8c') lseek(r0, 0x203ffffd, 0x0) 23:17:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xba\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00vN\x98sY\xd3\xe8\xbe\'~\xc3\xa3T\v\xca\xa4_wR*\x149\x93\xcd\xd8\'4\x11\fT\xe5\x97I\xa3<4\":\xe2\xaf\xcc d\x12\xd4\xdb\xbexh\xb51\xef\xb2\x17^\xd5\xc1\x89\xf6>\x05\x82\x80\xbb\x9eG\x0fjOH\xa4\xa7\xc6\x8b\tWY\xa3\x1eFG\x14\xc6\x82\x7f&\xa0\x8a\bpcI^2\x93\x8fEl\x1b\xa7f\xda\x8b\x91\xfbxe\xe5\xa6\x14\x83\xe1\\\x04\xef\xb7\xe2\"\x10oX\xd4\x9ch4\xac,h7at\xb9\xa6Q\x03') prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000440)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = dup(r0) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ioctl$TIOCCONS(r1, 0x541d) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0) 23:17:09 executing program 4: socket$inet_tcp(0x2, 0x1, 0x0) r0 = gettid() ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(r0, 0x39) ptrace$setregs(0xd, r0, 0x0, &(0x7f0000000080)) ptrace$cont(0x7, r0, 0x0, 0x0) syz_open_procfs(r0, &(0x7f0000000140)='smaps\x00\xbe#\xd7c\xbf\t\v|=\x12\x9aT\xda\x8a\x18\x1f2\x80\xd1\x1ah\x1a84\xd4\xfd\xc4\xf4g\x06\xf9\xe5\xd0=K{W\xd1Yc\xf3\xd6\t>RL\"\xc5f+%\x8d\xb9L\xc3w\x1a\xe1\xc1\xc9\xc0\xab\x1f/K\x8a\"\xf0\xf0\xa0\xa9\xeb\xb5g\xa2\xd6\xf1\xb2\xb3\x03\x92\xfe\xf6+\x15\x06\x05\xb2n\xa9\xe2\xa4\xe3\x85!M\xeb&') r1 = open$dir(&(0x7f0000000380)='./file0\x00', 0x8004002, 0x0) sendfile(r1, r1, 0x0, 0x8800000) read(r1, &(0x7f0000000000)=""/158, 0x9e) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffd000/0x1000)=nil) r2 = syz_open_procfs(0x0, &(0x7f0000000200)='fd/4\x00\xa7$\xbf\x05l\xb8\t\xd0\x06\xae\b\x86$dV\x92M%\xfd)0m6Z\x05\xae\xa7\rM\bp\xa6Q\x871B\x973\xfe\x05\x12\xf3\xd496\xf9\x1aM6\xb2|\xc5\x05\xbc\xe71g\xe4<&\xd2\xd8g\xb6\xa2U\xae\x9a\x17F\xa5xi\xe8_\xa8R\x96d\x99\xf6_E\xd0\x8f<\xa840\xd6\x84\xd0\x17\xafP\'\xdc{\b\x94\x00Y+\x18N\\\xc9\x1f\a\xf9X\x125\xb9\xd6\xbf\x1a4V\x10\xa6Uq\xceN\xeb\xa8M\xb2?\xda\xfb\xb1\x9d\x94\x13O\xab\xde\xc0t\x8c\")\x05~\x0f\xb8\xf3\xf6d\xbe\xad\xee\"\xaa\x91\x05\xcb9A\x1a\x8d&\x9e\x81\xcf\x9eWvT\x8a\xbfl\x8a\x83%\xec\x94\xfd\x90\xeb\xb3\xa3\xa8\x90\x90\xdb\xc2X\xf48\xd1\x83Eu\xe5c\xd7\xb7qe\xab\xae\xef*\x9e\x95\xde\xa0\x894r[\\\xc4?\xb7\xcfo\xdb\xbeR\xc5\xbc\xb34\xbe}\xf7n/4}\xbc.t\x94\x1c%\xcb\x93\xea\"Aa(\xd6FX\xd8\b\xd1\x10N{\xe8\xbc)\xc8\x1e6\xff\x95\xa3\xf3\x84\xf4\xa5\xe8f\xc2@\x1f7h\xb3\xd6\xab\x9a\x03\x95>V\\\xc4%T\x94M\xc7`\x83\xa1\xa0\xc8gn\xe3\xfe\xef[\xb3\xbd\x18R\x1b=\xab\x97$\x03\xaa\x84C\x0eWD\xeea\xf5\xb9\x82\xea\xbd5:\"\xf6f/\xa1\x8f%8\xa8\x1e\xcf\xb6\xa7\xe1\x1b1\x94\xc1G\xf9\xfc\xc77\x1c\x00'/370) lseek(r2, 0x203ffffd, 0x0)