0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:21 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:21 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:21 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:21 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r0=>0x0})
setresuid(0xffffffffffffffff, r0, 0x0)
r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r1)

12:14:21 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:21 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:14:35 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:14:35 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1371.478290] Process accounting resumed
12:14:35 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:35 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:14:48 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x9bbb)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

[ 1384.566792] perf: interrupt took too long (2503 > 2500), lowering kernel.perf_event_max_sample_rate to 79000
12:14:48 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r0}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:14:48 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, <r8=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r0=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r0}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:15:02 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:02 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:15:16 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r0=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, 0x0)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 0:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r0=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r0}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r0=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r0}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1412.479031] Process accounting paused
12:15:16 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:16 executing program 6:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r0=>0x0})
setresuid(0xffffffffffffffff, r0, 0x0)
r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r1)

12:15:29 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', 0x0, 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:15:29 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, <r8=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:29 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:15:29 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:30 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:30 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:44 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:15:44 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:15:44 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:44 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:44 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 4:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r3}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 2:
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:15:45 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18)
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
setresuid(0xffffffffffffffff, r1, 0x0)
r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r2)

12:15:45 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:15:45 executing program 2:
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:45 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, <r8=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
r4 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r4, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 2:
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:15:59 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x0, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:00 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:00 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, 0x0)
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:00 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
setresuid(0xffffffffffffffff, r2, 0x0)
r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3)

12:16:00 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:00 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:00 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:00 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:00 executing program 4:
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1455.929105] Process accounting resumed
12:16:14 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, 0x0)
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 4:
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 4:
r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, 0x0)
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:14 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:14 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:14 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:14 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:27 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:27 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, 0x0, 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:27 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:27 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:27 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:27 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:27 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:27 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:27 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:40 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, 0x0, 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1496.284974] Process accounting paused
12:16:40 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, 0x0, 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}})
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
setresuid(0xffffffffffffffff, r2, 0x0)
r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3)

12:16:40 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:40 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}})
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
setresuid(0xffffffffffffffff, r2, 0x0)
r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3)

12:16:57 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:57 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:57 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:57 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:16:57 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x0, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:16:57 executing program 7:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, <r8=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:17:15 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}})
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
setresuid(0xffffffffffffffff, r2, 0x0)
r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3)

12:17:15 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=','])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

[ 1530.924147] Process accounting resumed
12:17:15 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:17:15 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x3}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r2=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r3=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r4=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r5=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r5}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r7=>0x0, <r8=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r6, {r7, r8}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r2}, {0x2, 0x3, r3}, {0x2, 0x7, r4}, {0x2, 0x5, r5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r8}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:15 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=','])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=','])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x0, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:17:30 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:17:30 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:17:30 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:17:30 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, 0x0)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:30 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, 0x0)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
r6 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r6, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:17:44 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, 0x0)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:44 executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:45 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:45 executing program 4:
openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:45 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:45 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:45 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:17:45 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:17:45 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1560.989088] Process accounting paused
12:18:01 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:01 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=','])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:01 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(0x0, &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:01 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r1}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:01 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:01 executing program 7:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}})
getgid()
setresuid(0xffffffffffffffff, 0x0, 0x0)
r2 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r2)

12:18:18 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:18 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r6}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r7}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:18 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

[ 1594.167112] Process accounting resumed
12:18:18 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:18:18 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
r7 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r7, 0x40086602, &(0x7f0000000040)=0x100000)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:18 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:32 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:18:32 executing program 6:
syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0x18)
r1 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r1, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(r1, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}})
getgid()
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
setresuid(0xffffffffffffffff, r2, 0x0)
r3 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r3)

12:18:32 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:18:32 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:32 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:18:32 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:18:32 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:32 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:18:32 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:32 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(0xffffffffffffffff, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:32 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:32 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:45 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:45 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:45 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:18:45 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:45 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:45 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:45 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:18:45 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:45 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:45 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:18:45 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:18:45 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:00 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, 0x0, &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:00 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:00 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsro', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:00 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:00 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:00 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:00 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:19:00 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:00 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:19:00 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:00 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:00 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1636.224952] Process accounting paused
12:19:00 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:00 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsro', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:00 executing program 6:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:13 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:19:13 executing program 6:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
r1 = socket$inet6_tcp(0xa, 0x1, 0x0)
bind$inet6(r1, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(r1, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(r1, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, &(0x7f0000000440)=0xe8)
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r5=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r6}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2, r3}, {0x2, 0x3, r4}, {0x2, 0x7, r5}, {0x2, 0x5, r6}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:13 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:13 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:13 executing program 7:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:13 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:13 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsro', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:13 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:13 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', 0x0, 0x0, 0x2)

12:19:13 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:13 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:13 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:13 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:13 executing program 7:
r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x18)
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r2, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}})
getgid()
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, <r4=>0x0})
openat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x202003, 0x3)
setresuid(0xffffffffffffffff, r3, 0x0)
r5 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r5)
keyctl$chown(0x4, r5, 0xee00, r4)

12:19:13 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:13 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:14 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

[ 1663.019644] FAULT_INJECTION: forcing a failure.
[ 1663.019644] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1663.021000] CPU: 1 PID: 9299 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1663.021736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1663.022647] Call Trace:
[ 1663.022947]  dump_stack+0x107/0x167
[ 1663.023345]  should_fail.cold+0x5/0xa
[ 1663.023761]  strncpy_from_user+0x34/0x470
[ 1663.024215]  __do_sys_add_key+0xa9/0x430
[ 1663.024658]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1663.025158]  ? ksys_write+0x1a9/0x260
[ 1663.025563]  ? __ia32_sys_read+0xb0/0xb0
[ 1663.026011]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1663.026598]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1663.027167]  do_syscall_64+0x33/0x40
[ 1663.027577]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1663.028134] RIP: 0033:0x7f6afab3cb19
[ 1663.028539] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1663.030504] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1663.031359] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1663.032122] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1663.032885] RBP: 00007f6af80b21d0 R08: 0000000035c89f06 R09: 0000000000000000
[ 1663.033643] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1663.034442] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:19:27 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 1)

12:19:27 executing program 7:
r0 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./mnt\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
syz_mount_image$nfs4(0x0, &(0x7f00000010c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(0xffffffffffffffff, 0x89f6, 0x0)
mkdirat(0xffffffffffffff9c, &(0x7f00000004c0)='mnt/encrypted_dir\x00', 0x0)
perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ftruncate(0xffffffffffffffff, 0x0)
r1 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x201, 0x0)
mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x18)
r2 = openat$procfs(0xffffffffffffff9c, &(0x7f000000b480)='/proc/cgroups\x00', 0x0, 0x0)
readv(r2, &(0x7f0000000000)=[{&(0x7f0000000100)=""/114, 0x72}], 0x1)
ioctl$sock_ipv6_tunnel_SIOCDELPRL(r2, 0x89f6, &(0x7f0000000b00)={'ip6_vti0\x00', &(0x7f0000000a80)={'ip6tnl0\x00', 0x0, 0x29, 0x8, 0x0, 0x6, 0x0, @mcast1, @private0, 0x700, 0x20, 0x101, 0x7}})
getgid()
stat(&(0x7f0000000340)='.\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, <r3=>0x0, <r4=>0x0})
openat(r0, &(0x7f0000000080)='./file0/file0\x00', 0x202003, 0x3)
setresuid(0xffffffffffffffff, r3, 0x0)
r5 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r5)
keyctl$chown(0x4, r5, 0xee00, r4)

12:19:27 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r1=>0x0}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, r1}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:27 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:27 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:27 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:27 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:19:27 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:27 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:27 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:19:27 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 2)

[ 1663.118980] FAULT_INJECTION: forcing a failure.
[ 1663.118980] name failslab, interval 1, probability 0, space 0, times 0
[ 1663.120253] CPU: 1 PID: 9319 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1663.120999] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1663.121911] Call Trace:
[ 1663.122262]  dump_stack+0x107/0x167
[ 1663.122668]  should_fail.cold+0x5/0xa
[ 1663.123100]  should_failslab+0x5/0x20
[ 1663.123514]  __kmalloc_track_caller+0x79/0x370
[ 1663.124011]  ? strndup_user+0x74/0xe0
[ 1663.124424]  ? __check_object_size+0xae/0x440
[ 1663.124928]  memdup_user+0x22/0xd0
[ 1663.125315]  strndup_user+0x74/0xe0
[ 1663.125717]  __do_sys_add_key+0x131/0x430
[ 1663.126183]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1663.126676]  ? ksys_write+0x1a9/0x260
[ 1663.127092]  ? __ia32_sys_read+0xb0/0xb0
[ 1663.127536]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1663.128110]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1663.128124]  do_syscall_64+0x33/0x40
[ 1663.128135]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1663.128142] RIP: 0033:0x7f6afab3cb19
[ 1663.128153] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1663.128158] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1663.128170] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
12:19:27 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 3)

12:19:27 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1663.128177] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1663.128182] RBP: 00007f6af80b21d0 R08: 000000000bce27eb R09: 0000000000000000
[ 1663.128189] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1663.128194] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
[ 1663.230007] FAULT_INJECTION: forcing a failure.
[ 1663.230007] name failslab, interval 1, probability 0, space 0, times 0
[ 1663.231333] CPU: 1 PID: 9324 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1663.232097] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1663.233007] Call Trace:
[ 1663.233304]  dump_stack+0x107/0x167
[ 1663.233719]  should_fail.cold+0x5/0xa
[ 1663.234174]  ? create_object.isra.0+0x3a/0xa20
[ 1663.234693]  should_failslab+0x5/0x20
[ 1663.235129]  kmem_cache_alloc+0x5b/0x310
[ 1663.235588]  create_object.isra.0+0x3a/0xa20
[ 1663.236086]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1663.236660]  __kmalloc_track_caller+0x177/0x370
[ 1663.237201]  ? strndup_user+0x74/0xe0
[ 1663.237631]  ? __check_object_size+0xae/0x440
[ 1663.238148]  memdup_user+0x22/0xd0
[ 1663.238551]  strndup_user+0x74/0xe0
[ 1663.238967]  __do_sys_add_key+0x131/0x430
[ 1663.239429]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1663.239953]  ? ksys_write+0x1a9/0x260
[ 1663.240382]  ? __ia32_sys_read+0xb0/0xb0
[ 1663.240845]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1663.241443]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1663.242026]  do_syscall_64+0x33/0x40
[ 1663.242462]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1663.243043] RIP: 0033:0x7f6afab3cb19
[ 1663.243464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1663.245540] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1663.246424] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1663.247243] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1663.248053] RBP: 00007f6af80b21d0 R08: 0000000024c380d4 R09: 0000000000000000
[ 1663.248861] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1663.249677] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:19:41 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 4)

12:19:41 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:41 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:41 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:41 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:41 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:41 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:41 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 1)

[ 1677.278823] FAULT_INJECTION: forcing a failure.
[ 1677.278823] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1677.281431] CPU: 1 PID: 9336 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1677.282935] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1677.284727] Call Trace:
[ 1677.285311]  dump_stack+0x107/0x167
[ 1677.286113]  should_fail.cold+0x5/0xa
[ 1677.286955]  _copy_from_user+0x2e/0x1b0
[ 1677.287820]  memdup_user+0x65/0xd0
[ 1677.288592]  strndup_user+0x74/0xe0
[ 1677.289386]  __do_sys_add_key+0x131/0x430
[ 1677.290292]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1677.291297]  ? ksys_write+0x1a9/0x260
[ 1677.292121]  ? __ia32_sys_read+0xb0/0xb0
[ 1677.293004]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1677.294137]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1677.295279]  do_syscall_64+0x33/0x40
[ 1677.296085]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1677.297191] RIP: 0033:0x7f6afab3cb19
[ 1677.297995] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1677.301963] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1677.303610] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1677.305148] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1677.306709] RBP: 00007f6af80b21d0 R08: 000000000dd8ea99 R09: 0000000000000000
[ 1677.308248] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1677.309786] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:19:41 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:41 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:41 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1677.332689] FAULT_INJECTION: forcing a failure.
[ 1677.332689] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1677.334083] CPU: 0 PID: 9349 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1677.334853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1677.335749] Call Trace:
[ 1677.336041]  dump_stack+0x107/0x167
[ 1677.336453]  should_fail.cold+0x5/0xa
[ 1677.336872]  strncpy_from_user+0x34/0x470
[ 1677.337338]  __do_sys_add_key+0xa9/0x430
[ 1677.337784]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1677.338302]  ? ksys_write+0x1a9/0x260
[ 1677.338713]  ? __ia32_sys_read+0xb0/0xb0
[ 1677.339170]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1677.339758]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1677.340323]  do_syscall_64+0x33/0x40
[ 1677.340746]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1677.341297] RIP: 0033:0x7f4453ef4b19
[ 1677.341708] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1677.343738] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1677.344567] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1677.345351] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1677.346133] RBP: 00007f445146a1d0 R08: 0000000004b3e8bd R09: 0000000000000000
[ 1677.346915] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1677.347693] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:19:41 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:41 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:41 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

[ 1677.480471] Process accounting resumed
12:19:56 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1691.852906] FAULT_INJECTION: forcing a failure.
[ 1691.852906] name failslab, interval 1, probability 0, space 0, times 0
[ 1691.855457] CPU: 0 PID: 9367 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1691.856951] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1691.858774] Call Trace:
[ 1691.859361]  dump_stack+0x107/0x167
[ 1691.860167]  should_fail.cold+0x5/0xa
[ 1691.861013]  should_failslab+0x5/0x20
[ 1691.861855]  __kmalloc_track_caller+0x79/0x370
[ 1691.862892]  ? strndup_user+0x74/0xe0
[ 1691.863727]  ? __check_object_size+0xae/0x440
[ 1691.864907]  memdup_user+0x22/0xd0
[ 1691.865694]  strndup_user+0x74/0xe0
[ 1691.866509]  __do_sys_add_key+0x131/0x430
[ 1691.867423]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1691.868442]  ? ksys_write+0x1a9/0x260
[ 1691.869279]  ? __ia32_sys_read+0xb0/0xb0
[ 1691.870178]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1691.871343]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1691.872481]  do_syscall_64+0x33/0x40
[ 1691.873304]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1691.874443] RIP: 0033:0x7f4453ef4b19
[ 1691.875262] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1691.879293] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1691.880962] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1691.882518] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1691.884066] RBP: 00007f445146a1d0 R08: 000000002b0815bc R09: 0000000000000000
[ 1691.885612] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1691.887174] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:19:56 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:56 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 2)

12:19:56 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:56 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:56 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 5)

12:19:56 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:56 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:56 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:56 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1691.951381] FAULT_INJECTION: forcing a failure.
[ 1691.951381] name fail_page_alloc, interval 1, probability 0, space 0, times 1
[ 1691.954064] CPU: 0 PID: 9380 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1691.955556] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1691.957340] Call Trace:
[ 1691.957916]  dump_stack+0x107/0x167
[ 1691.958716]  should_fail.cold+0x5/0xa
[ 1691.959546]  __alloc_pages_nodemask+0x182/0x600
[ 1691.960546]  ? lock_acquire+0x197/0x470
[ 1691.961403]  ? find_held_lock+0x2c/0x110
[ 1691.962286]  ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130
[ 1691.963610]  kmalloc_large_node+0x55/0x1a0
[ 1691.964526]  __kmalloc_node+0x30d/0x420
[ 1691.965386]  kvmalloc_node+0xc0/0x170
[ 1691.966205]  __do_sys_add_key+0x311/0x430
[ 1691.967117]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1691.968110]  ? ksys_write+0x1a9/0x260
[ 1691.968934]  ? __ia32_sys_read+0xb0/0xb0
[ 1691.969807]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1691.970940]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1691.972046]  do_syscall_64+0x33/0x40
[ 1691.972842]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1691.973932] RIP: 0033:0x7f6afab3cb19
[ 1691.974742] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1691.978652] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1691.980274] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1691.981792] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1691.983319] RBP: 00007f6af80b21d0 R08: 000000001cce91c0 R09: 0000000000000000
[ 1691.984839] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1691.986353] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:19:56 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:19:56 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:19:56 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:19:56 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x0, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:19:56 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 6)

[ 1692.086769] FAULT_INJECTION: forcing a failure.
[ 1692.086769] name failslab, interval 1, probability 0, space 0, times 0
[ 1692.088492] CPU: 0 PID: 9389 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1692.089505] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1692.090743] Call Trace:
[ 1692.091153]  dump_stack+0x107/0x167
[ 1692.091701]  should_fail.cold+0x5/0xa
[ 1692.092277]  ? create_object.isra.0+0x3a/0xa20
[ 1692.092974]  should_failslab+0x5/0x20
[ 1692.093559]  kmem_cache_alloc+0x5b/0x310
[ 1692.094166]  create_object.isra.0+0x3a/0xa20
[ 1692.094844]  ? kasan_unpoison_shadow+0x33/0x50
[ 1692.095549]  kmalloc_large_node+0x124/0x1a0
[ 1692.096203]  __kmalloc_node+0x30d/0x420
[ 1692.096812]  kvmalloc_node+0xc0/0x170
[ 1692.097366]  __do_sys_add_key+0x311/0x430
[ 1692.097984]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1692.098684]  ? ksys_write+0x1a9/0x260
[ 1692.099242]  ? __ia32_sys_read+0xb0/0xb0
[ 1692.099868]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1692.100645]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1692.101417]  do_syscall_64+0x33/0x40
[ 1692.101974]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1692.102735] RIP: 0033:0x7f6afab3cb19
[ 1692.103283] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1692.105963] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1692.107102] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1692.108159] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1692.109204] RBP: 00007f6af80b21d0 R08: 0000000025612e02 R09: 0000000000000000
[ 1692.110360] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1692.111435] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:19:56 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 3)

12:19:56 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:19:56 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1692.181913] FAULT_INJECTION: forcing a failure.
[ 1692.181913] name failslab, interval 1, probability 0, space 0, times 0
[ 1692.183566] CPU: 1 PID: 9397 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1692.184510] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1692.185659] Call Trace:
[ 1692.186037]  dump_stack+0x107/0x167
[ 1692.186555]  should_fail.cold+0x5/0xa
[ 1692.187088]  ? create_object.isra.0+0x3a/0xa20
[ 1692.187736]  should_failslab+0x5/0x20
[ 1692.188271]  kmem_cache_alloc+0x5b/0x310
[ 1692.188840]  create_object.isra.0+0x3a/0xa20
[ 1692.189452]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1692.190161]  __kmalloc_track_caller+0x177/0x370
[ 1692.190803]  ? strndup_user+0x74/0xe0
[ 1692.191339]  ? __check_object_size+0xae/0x440
[ 1692.191976]  memdup_user+0x22/0xd0
[ 1692.192474]  strndup_user+0x74/0xe0
[ 1692.192998]  __do_sys_add_key+0x131/0x430
[ 1692.193590]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1692.194231]  ? ksys_write+0x1a9/0x260
[ 1692.194757]  ? __ia32_sys_read+0xb0/0xb0
[ 1692.195338]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1692.196069]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1692.196796]  do_syscall_64+0x33/0x40
[ 1692.197308]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1692.198018] RIP: 0033:0x7f4453ef4b19
[ 1692.198525] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1692.201067] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1692.202099] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1692.203107] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1692.204092] RBP: 00007f445146a1d0 R08: 0000000032c0dea9 R09: 0000000000000000
[ 1692.205141] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1692.206186] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:20:10 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:20:10 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x0, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1705.715073] FAULT_INJECTION: forcing a failure.
[ 1705.715073] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1705.716393] CPU: 1 PID: 9410 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1705.717111] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1705.718003] Call Trace:
[ 1705.718294]  dump_stack+0x107/0x167
[ 1705.718694]  should_fail.cold+0x5/0xa
[ 1705.719104]  _copy_from_user+0x2e/0x1b0
[ 1705.719535]  __do_sys_add_key+0x345/0x430
[ 1705.719978]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1705.720486]  ? ksys_write+0x1a9/0x260
[ 1705.720902]  ? __ia32_sys_read+0xb0/0xb0
[ 1705.721341]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1705.721912]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1705.722470]  do_syscall_64+0x33/0x40
[ 1705.722885]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1705.723435] RIP: 0033:0x7f6afab3cb19
[ 1705.723834] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1705.725792] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1705.726624] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1705.727398] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1705.728164] RBP: 00007f6af80b21d0 R08: 0000000015c23476 R09: 0000000000000000
[ 1705.728945] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1705.729717] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:20:10 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:20:10 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 4)

12:20:10 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:20:10 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:20:10 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:10 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 7)

[ 1705.754846] FAULT_INJECTION: forcing a failure.
[ 1705.754846] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1705.757523] CPU: 0 PID: 9419 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1705.759117] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1705.760940] Call Trace:
[ 1705.761519]  dump_stack+0x107/0x167
[ 1705.762321]  should_fail.cold+0x5/0xa
[ 1705.763174]  _copy_from_user+0x2e/0x1b0
[ 1705.764052]  memdup_user+0x65/0xd0
[ 1705.764837]  strndup_user+0x74/0xe0
[ 1705.765632]  __do_sys_add_key+0x131/0x430
[ 1705.766541]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1705.767612]  ? ksys_write+0x1a9/0x260
[ 1705.768444]  ? __ia32_sys_read+0xb0/0xb0
[ 1705.769334]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1705.770479]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1705.771612]  do_syscall_64+0x33/0x40
[ 1705.772428]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1705.773534] RIP: 0033:0x7f4453ef4b19
[ 1705.774342] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1705.778322] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1705.779983] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1705.781523] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1705.783083] RBP: 00007f445146a1d0 R08: 00000000289658a0 R09: 0000000000000000
[ 1705.784620] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1705.786159] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:20:10 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:10 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:20:10 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:20:10 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:20:10 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 8)

12:20:10 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:10 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x0, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:10 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

[ 1705.882426] FAULT_INJECTION: forcing a failure.
[ 1705.882426] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 1705.883974] CPU: 1 PID: 9431 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1705.884741] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1705.885652] Call Trace:
[ 1705.885960]  dump_stack+0x107/0x167
[ 1705.886364]  should_fail.cold+0x5/0xa
[ 1705.886807]  __alloc_pages_nodemask+0x182/0x600
[ 1705.887316]  ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130
[ 1705.887982]  ? mark_held_locks+0x9e/0xe0
[ 1705.888428]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1705.888999]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1705.889592]  ? trace_hardirqs_on+0x5b/0x180
[ 1705.890074]  alloc_pages_current+0x187/0x280
[ 1705.890561]  kmalloc_order+0x35/0x160
[ 1705.890999]  kmalloc_order_trace+0x14/0xa0
[ 1705.891476]  dns_resolver_preparse+0x54b/0x8b0
[ 1705.891970]  ? lock_release+0x680/0x680
[ 1705.892406]  ? dns_resolver_free_preparse+0x40/0x40
[ 1705.892957]  ? find_held_lock+0x2c/0x110
[ 1705.893394]  ? down_read+0x10f/0x430
[ 1705.893807]  ? down_write+0x160/0x160
[ 1705.894226]  ? key_task_permission+0x2b5/0x400
[ 1705.894736]  ? dns_resolver_free_preparse+0x40/0x40
[ 1705.895267]  key_create_or_update+0x3e0/0xc30
[ 1705.895753]  ? key_alloc+0x1280/0x1280
[ 1705.896166]  ? join_session_keyring+0x350/0x350
[ 1705.896667]  ? exc_page_fault+0xca/0x1a0
[ 1705.897125]  ? copy_user_generic_string+0x2c/0x40
[ 1705.897652]  __do_sys_add_key+0x215/0x430
[ 1705.898107]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1705.898622]  ? ksys_write+0x1a9/0x260
[ 1705.899042]  ? __ia32_sys_read+0xb0/0xb0
[ 1705.899493]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1705.900056]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1705.900632]  do_syscall_64+0x33/0x40
[ 1705.901039]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1705.901611] RIP: 0033:0x7f6afab3cb19
[ 1705.902007] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1705.904054] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1705.904875] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1705.905651] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1705.906422] RBP: 00007f6af80b21d0 R08: 000000000bf33f35 R09: 0000000000000000
[ 1705.907222] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1705.907999] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:20:25 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:20:25 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:20:25 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:25 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:20:25 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 5)

12:20:25 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:25 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:25 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 9)

[ 1721.165178] FAULT_INJECTION: forcing a failure.
[ 1721.165178] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 1721.167930] CPU: 0 PID: 9458 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1721.168936] FAULT_INJECTION: forcing a failure.
[ 1721.168936] name failslab, interval 1, probability 0, space 0, times 0
[ 1721.169342] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1721.169349] Call Trace:
[ 1721.169382]  dump_stack+0x107/0x167
[ 1721.173843]  should_fail.cold+0x5/0xa
[ 1721.174616]  __alloc_pages_nodemask+0x182/0x600
[ 1721.175551]  ? lock_acquire+0x197/0x470
[ 1721.176349]  ? find_held_lock+0x2c/0x110
[ 1721.177171]  ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130
[ 1721.178396]  kmalloc_large_node+0x55/0x1a0
[ 1721.179252]  __kmalloc_node+0x30d/0x420
[ 1721.180068]  kvmalloc_node+0xc0/0x170
[ 1721.180841]  __do_sys_add_key+0x311/0x430
[ 1721.181677]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1721.182617]  ? ksys_write+0x1a9/0x260
[ 1721.183402]  ? __ia32_sys_read+0xb0/0xb0
[ 1721.184221]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1721.185278]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1721.186315]  do_syscall_64+0x33/0x40
[ 1721.187076]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1721.188106] RIP: 0033:0x7f4453ef4b19
[ 1721.188856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1721.192577] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1721.194107] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1721.195559] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1721.197000] RBP: 00007f445146a1d0 R08: 0000000006bd5a17 R09: 0000000000000000
[ 1721.198438] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1721.199900] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
[ 1721.201369] CPU: 1 PID: 9456 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1721.202353] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1721.203545] Call Trace:
[ 1721.203931]  dump_stack+0x107/0x167
[ 1721.204460]  should_fail.cold+0x5/0xa
[ 1721.205012]  ? create_object.isra.0+0x3a/0xa20
[ 1721.205675]  should_failslab+0x5/0x20
[ 1721.206224]  kmem_cache_alloc+0x5b/0x310
[ 1721.206819]  create_object.isra.0+0x3a/0xa20
[ 1721.207453]  ? kasan_unpoison_shadow+0x33/0x50
[ 1721.208118]  kmalloc_order+0xfe/0x160
[ 1721.208672]  kmalloc_order_trace+0x14/0xa0
[ 1721.209289]  dns_resolver_preparse+0x54b/0x8b0
[ 1721.209949]  ? lock_release+0x680/0x680
[ 1721.210529]  ? dns_resolver_free_preparse+0x40/0x40
[ 1721.211262]  ? find_held_lock+0x2c/0x110
[ 1721.211860]  ? down_read+0x10f/0x430
[ 1721.212397]  ? down_write+0x160/0x160
[ 1721.212955]  ? key_task_permission+0x2b5/0x400
[ 1721.213612]  ? dns_resolver_free_preparse+0x40/0x40
[ 1721.214329]  key_create_or_update+0x3e0/0xc30
[ 1721.214986]  ? key_alloc+0x1280/0x1280
[ 1721.215546]  ? join_session_keyring+0x350/0x350
[ 1721.216219]  ? exc_page_fault+0xca/0x1a0
[ 1721.216822]  ? copy_user_generic_string+0x2c/0x40
[ 1721.217523]  __do_sys_add_key+0x215/0x430
[ 1721.218117]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1721.218783]  ? ksys_write+0x1a9/0x260
[ 1721.219325]  ? __ia32_sys_read+0xb0/0xb0
[ 1721.219907]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1721.220653]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1721.221390]  do_syscall_64+0x33/0x40
[ 1721.221922]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1721.222650] RIP: 0033:0x7f6afab3cb19
[ 1721.223191] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1721.225806] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1721.226896] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1721.227917] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1721.228931] RBP: 00007f6af80b21d0 R08: 000000002f3d20bd R09: 0000000000000000
[ 1721.229946] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1721.230965] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:20:25 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:20:25 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1721.274961] Process accounting paused
12:20:25 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:20:25 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:20:25 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:20:25 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 10)

12:20:25 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:25 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 6)

12:20:25 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:25 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

[ 1721.441585] FAULT_INJECTION: forcing a failure.
[ 1721.441585] name failslab, interval 1, probability 0, space 0, times 0
[ 1721.444189] CPU: 0 PID: 9475 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1721.445554] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1721.447218] Call Trace:
[ 1721.447753]  dump_stack+0x107/0x167
[ 1721.448487]  should_fail.cold+0x5/0xa
[ 1721.449252]  ? assoc_array_insert+0xde/0x2aa0
[ 1721.450152]  should_failslab+0x5/0x20
[ 1721.450932]  kmem_cache_alloc_trace+0x55/0x320
[ 1721.451872]  assoc_array_insert+0xde/0x2aa0
[ 1721.452753]  ? lock_release+0x680/0x680
[ 1721.453567]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1721.454675]  ? assoc_array_cancel_edit+0x90/0x90
[ 1721.455647]  ? down_write+0xe0/0x160
[ 1721.456401]  ? down_write_killable+0x180/0x180
[ 1721.457327]  ? key_free_user_ns+0x130/0x130
[ 1721.458206]  __key_link_begin+0xec/0x250
[ 1721.459034]  key_create_or_update+0x468/0xc30
[ 1721.459942]  ? key_alloc+0x1280/0x1280
[ 1721.460727]  ? join_session_keyring+0x350/0x350
[ 1721.461671]  ? exc_page_fault+0xca/0x1a0
[ 1721.462521]  ? copy_user_generic_string+0x2c/0x40
[ 1721.463526]  __do_sys_add_key+0x215/0x430
[ 1721.464366]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1721.465312]  ? ksys_write+0x1a9/0x260
[ 1721.466085]  ? __ia32_sys_read+0xb0/0xb0
[ 1721.466938]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1721.468008]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1721.469064]  do_syscall_64+0x33/0x40
[ 1721.469821]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1721.470871] RIP: 0033:0x7f6afab3cb19
[ 1721.471627] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1721.475338] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1721.476874] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1721.478298] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1721.479732] RBP: 00007f6af80b21d0 R08: 000000002b890bd2 R09: 0000000000000000
[ 1721.481157] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1721.482586] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
[ 1721.499594] FAULT_INJECTION: forcing a failure.
[ 1721.499594] name failslab, interval 1, probability 0, space 0, times 0
[ 1721.501145] CPU: 1 PID: 9482 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1721.502055] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1721.503153] Call Trace:
[ 1721.503513]  dump_stack+0x107/0x167
[ 1721.504012]  should_fail.cold+0x5/0xa
[ 1721.504540]  ? create_object.isra.0+0x3a/0xa20
[ 1721.505151]  should_failslab+0x5/0x20
[ 1721.505662]  kmem_cache_alloc+0x5b/0x310
[ 1721.506215]  create_object.isra.0+0x3a/0xa20
[ 1721.506807]  ? kasan_unpoison_shadow+0x33/0x50
[ 1721.507436]  kmalloc_large_node+0x124/0x1a0
[ 1721.508013]  __kmalloc_node+0x30d/0x420
[ 1721.508574]  kvmalloc_node+0xc0/0x170
[ 1721.509104]  __do_sys_add_key+0x311/0x430
[ 1721.509694]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1721.510352]  ? ksys_write+0x1a9/0x260
[ 1721.510885]  ? __ia32_sys_read+0xb0/0xb0
[ 1721.511459]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1721.512196]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1721.512929]  do_syscall_64+0x33/0x40
[ 1721.513451]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1721.514184] RIP: 0033:0x7f4453ef4b19
[ 1721.514703] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1721.517250] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1721.518314] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1721.519319] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1721.520314] RBP: 00007f445146a1d0 R08: 000000002e850e54 R09: 0000000000000000
[ 1721.521304] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1721.522294] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:20:39 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 7)

12:20:39 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 11)

12:20:39 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:20:39 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:20:39 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:20:39 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:20:39 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fow', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:39 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1734.843800] FAULT_INJECTION: forcing a failure.
[ 1734.843800] name failslab, interval 1, probability 0, space 0, times 0
[ 1734.845071] CPU: 1 PID: 9499 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1734.845813] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1734.846694] Call Trace:
[ 1734.846992]  dump_stack+0x107/0x167
[ 1734.847403]  should_fail.cold+0x5/0xa
[ 1734.847816]  ? create_object.isra.0+0x3a/0xa20
[ 1734.848313]  should_failslab+0x5/0x20
[ 1734.848726]  kmem_cache_alloc+0x5b/0x310
[ 1734.849165]  create_object.isra.0+0x3a/0xa20
[ 1734.849641]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1734.850203]  kmem_cache_alloc_trace+0x151/0x320
[ 1734.850708]  assoc_array_insert+0xde/0x2aa0
[ 1734.851184]  ? lock_release+0x680/0x680
[ 1734.851622]  ? io_schedule_timeout+0x140/0x140
[ 1734.852138]  ? dns_resolver_free_preparse+0x40/0x40
[ 1734.852679]  ? assoc_array_cancel_edit+0x90/0x90
[ 1734.853201]  ? down_write+0xe0/0x160
[ 1734.853602]  ? down_write_killable+0x180/0x180
[ 1734.854098]  ? key_free_user_ns+0x130/0x130
[ 1734.854562]  __key_link_begin+0xec/0x250
[ 1734.855019]  key_create_or_update+0x468/0xc30
[ 1734.855523]  ? key_alloc+0x1280/0x1280
[ 1734.855942]  ? join_session_keyring+0x350/0x350
[ 1734.856450]  ? exc_page_fault+0xca/0x1a0
[ 1734.856910]  ? copy_user_generic_string+0x2c/0x40
[ 1734.857434]  __do_sys_add_key+0x215/0x430
[ 1734.857542] FAULT_INJECTION: forcing a failure.
[ 1734.857542] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1734.857888]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1734.860650]  ? ksys_write+0x1a9/0x260
[ 1734.861055]  ? __ia32_sys_read+0xb0/0xb0
[ 1734.861497]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1734.862065]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1734.862617]  do_syscall_64+0x33/0x40
[ 1734.863035]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1734.863591] RIP: 0033:0x7f6afab3cb19
[ 1734.863997] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1734.866005] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1734.866825] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1734.867597] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1734.868368] RBP: 00007f6af80b21d0 R08: 0000000014659402 R09: 0000000000000000
[ 1734.869137] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1734.869908] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
[ 1734.870713] CPU: 0 PID: 9501 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1734.872604] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1734.874823] Call Trace:
[ 1734.875506]  dump_stack+0x107/0x167
[ 1734.876414]  should_fail.cold+0x5/0xa
[ 1734.877416]  _copy_from_user+0x2e/0x1b0
[ 1734.878367]  __do_sys_add_key+0x345/0x430
[ 1734.879398]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1734.880658]  ? ksys_write+0x1a9/0x260
[ 1734.881691]  ? __ia32_sys_read+0xb0/0xb0
[ 1734.882728]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1734.883866]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1734.884923]  do_syscall_64+0x33/0x40
[ 1734.885669]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1734.886716] RIP: 0033:0x7f4453ef4b19
[ 1734.887479] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1734.891237] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1734.892760] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1734.894183] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1734.895630] RBP: 00007f445146a1d0 R08: 000000003d5f98fc R09: 0000000000000000
[ 1734.897053] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1734.898473] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:20:39 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 12)

12:20:39 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:20:39 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:20:39 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:20:39 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

[ 1734.958122] FAULT_INJECTION: forcing a failure.
[ 1734.958122] name failslab, interval 1, probability 0, space 0, times 0
[ 1734.959461] CPU: 1 PID: 9508 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1734.960205] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1734.961099] Call Trace:
[ 1734.961404]  dump_stack+0x107/0x167
[ 1734.961803]  should_fail.cold+0x5/0xa
[ 1734.962219]  ? assoc_array_insert+0x73f/0x2aa0
[ 1734.962727]  should_failslab+0x5/0x20
[ 1734.963150]  kmem_cache_alloc_trace+0x55/0x320
[ 1734.963668]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1734.964233]  assoc_array_insert+0x73f/0x2aa0
[ 1734.964728]  ? lock_release+0x680/0x680
[ 1734.965171]  ? dns_resolver_preparse+0x60e/0x8b0
[ 1734.965699]  ? lock_release+0x680/0x680
[ 1734.966109]  ? dns_resolver_free_preparse+0x40/0x40
[ 1734.966666]  ? assoc_array_cancel_edit+0x90/0x90
[ 1734.967206]  ? down_write+0xe0/0x160
[ 1734.967611]  ? down_write_killable+0x180/0x180
[ 1734.968110]  ? key_free_user_ns+0x130/0x130
[ 1734.968551]  __key_link_begin+0xec/0x250
[ 1734.969001]  key_create_or_update+0x468/0xc30
[ 1734.969514]  ? key_alloc+0x1280/0x1280
[ 1734.969941]  ? join_session_keyring+0x350/0x350
[ 1734.970460]  ? exc_page_fault+0xca/0x1a0
[ 1734.970927]  ? copy_user_generic_string+0x2c/0x40
[ 1734.971469]  __do_sys_add_key+0x215/0x430
[ 1734.971930]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1734.972433]  ? ksys_write+0x1a9/0x260
[ 1734.972853]  ? __ia32_sys_read+0xb0/0xb0
[ 1734.973296]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1734.973870]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1734.974437]  do_syscall_64+0x33/0x40
[ 1734.974859]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1734.975430] RIP: 0033:0x7f6afab3cb19
[ 1734.975840] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1734.977835] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1734.978681] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1734.979461] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1734.980194] RBP: 00007f6af80b21d0 R08: 0000000015981223 R09: 0000000000000000
[ 1734.980984] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1734.981769] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:20:39 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fow', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:39 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:39 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 13)

[ 1735.109322] FAULT_INJECTION: forcing a failure.
[ 1735.109322] name failslab, interval 1, probability 0, space 0, times 0
[ 1735.111770] CPU: 0 PID: 9518 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1735.113150] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1735.114830] Call Trace:
[ 1735.115379]  dump_stack+0x107/0x167
[ 1735.116129]  should_fail.cold+0x5/0xa
[ 1735.116911]  ? create_object.isra.0+0x3a/0xa20
[ 1735.117952]  should_failslab+0x5/0x20
[ 1735.118725]  kmem_cache_alloc+0x5b/0x310
[ 1735.119581]  create_object.isra.0+0x3a/0xa20
[ 1735.120487]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1735.121533]  kmem_cache_alloc_trace+0x151/0x320
[ 1735.122492]  assoc_array_insert+0x73f/0x2aa0
[ 1735.123416]  ? lock_release+0x680/0x680
[ 1735.124236]  ? dns_resolver_preparse+0x60e/0x8b0
[ 1735.125203]  ? lock_release+0x680/0x680
[ 1735.126036]  ? dns_resolver_free_preparse+0x40/0x40
[ 1735.127074]  ? assoc_array_cancel_edit+0x90/0x90
[ 1735.128048]  ? down_write+0xe0/0x160
[ 1735.128805]  ? down_write_killable+0x180/0x180
[ 1735.129724]  ? key_free_user_ns+0x130/0x130
[ 1735.130601]  __key_link_begin+0xec/0x250
[ 1735.131434]  key_create_or_update+0x468/0xc30
[ 1735.132339]  ? key_alloc+0x1280/0x1280
[ 1735.133123]  ? join_session_keyring+0x350/0x350
[ 1735.134054]  ? exc_page_fault+0xca/0x1a0
[ 1735.134894]  ? copy_user_generic_string+0x2c/0x40
[ 1735.135881]  __do_sys_add_key+0x215/0x430
[ 1735.136727]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1735.137651]  ? ksys_write+0x1a9/0x260
[ 1735.138414]  ? __ia32_sys_read+0xb0/0xb0
[ 1735.139252]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1735.140298]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1735.141345]  do_syscall_64+0x33/0x40
[ 1735.142090]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1735.143132] RIP: 0033:0x7f6afab3cb19
[ 1735.143886] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1735.147591] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1735.149109] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1735.150543] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1735.151989] RBP: 00007f6af80b21d0 R08: 0000000015ed1f26 R09: 0000000000000000
[ 1735.153420] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1735.154857] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:20:53 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:53 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 14)

12:20:53 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:20:53 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:20:53 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:53 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:20:53 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fow', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:53 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 8)

[ 1748.965811] FAULT_INJECTION: forcing a failure.
[ 1748.965811] name failslab, interval 1, probability 0, space 0, times 0
[ 1748.966286] FAULT_INJECTION: forcing a failure.
[ 1748.966286] name fail_page_alloc, interval 1, probability 0, space 0, times 0
[ 1748.968229] CPU: 1 PID: 9536 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1748.968247] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1748.973669] Call Trace:
[ 1748.974239]  dump_stack+0x107/0x167
[ 1748.974991]  should_fail.cold+0x5/0xa
[ 1748.975801]  ? key_alloc+0x3d1/0x1280
[ 1748.976604]  should_failslab+0x5/0x20
[ 1748.977393]  kmem_cache_alloc+0x5b/0x310
[ 1748.978262]  key_alloc+0x3d1/0x1280
[ 1748.979107]  ? key_user_lookup+0x560/0x560
[ 1748.980041]  key_create_or_update+0x6c3/0xc30
[ 1748.980957]  ? key_alloc+0x1280/0x1280
[ 1748.981728]  ? join_session_keyring+0x350/0x350
[ 1748.982684]  ? exc_page_fault+0xca/0x1a0
[ 1748.983534]  ? copy_user_generic_string+0x2c/0x40
[ 1748.984531]  __do_sys_add_key+0x215/0x430
[ 1748.985345]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1748.986284]  ? ksys_write+0x1a9/0x260
[ 1748.987051]  ? __ia32_sys_read+0xb0/0xb0
[ 1748.987921]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1748.989001]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1748.990064]  do_syscall_64+0x33/0x40
[ 1748.990830]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1748.991849] RIP: 0033:0x7f6afab3cb19
[ 1748.992578] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1748.996282] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1748.997820] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1748.999278] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1749.000717] RBP: 00007f6af80b21d0 R08: 000000001d0d0c1a R09: 0000000000000000
[ 1749.002147] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1749.003587] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
[ 1749.005078] CPU: 0 PID: 9540 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1749.006474] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1749.008168] Call Trace:
[ 1749.008720]  dump_stack+0x107/0x167
[ 1749.009491]  should_fail.cold+0x5/0xa
[ 1749.010278]  __alloc_pages_nodemask+0x182/0x600
[ 1749.011245]  ? __alloc_pages_slowpath.constprop.0+0x2130/0x2130
[ 1749.012470]  ? mark_held_locks+0x9e/0xe0
[ 1749.013315]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1749.014386]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1749.015515]  ? trace_hardirqs_on+0x5b/0x180
[ 1749.016406]  alloc_pages_current+0x187/0x280
[ 1749.017344]  kmalloc_order+0x35/0x160
[ 1749.018281]  kmalloc_order_trace+0x14/0xa0
[ 1749.019334]  dns_resolver_preparse+0x54b/0x8b0
[ 1749.020434]  ? lock_release+0x680/0x680
[ 1749.021409]  ? dns_resolver_free_preparse+0x40/0x40
[ 1749.022610]  ? find_held_lock+0x2c/0x110
[ 1749.023644]  ? down_read+0x10f/0x430
[ 1749.024468]  ? down_write+0x160/0x160
[ 1749.025402]  ? key_task_permission+0x2b5/0x400
[ 1749.026354]  ? dns_resolver_free_preparse+0x40/0x40
[ 1749.027571]  key_create_or_update+0x3e0/0xc30
[ 1749.028507]  ? key_alloc+0x1280/0x1280
[ 1749.029448]  ? join_session_keyring+0x350/0x350
[ 1749.030406]  ? exc_page_fault+0xca/0x1a0
[ 1749.031410]  ? copy_user_generic_string+0x2c/0x40
[ 1749.032407]  __do_sys_add_key+0x215/0x430
[ 1749.033255]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1749.034194]  ? ksys_write+0x1a9/0x260
[ 1749.034966]  ? __ia32_sys_read+0xb0/0xb0
[ 1749.035823]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1749.036891]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1749.037944]  do_syscall_64+0x33/0x40
[ 1749.038705]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1749.039758] RIP: 0033:0x7f4453ef4b19
[ 1749.040512] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1749.044260] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1749.045800] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1749.047249] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1749.048683] RBP: 00007f445146a1d0 R08: 0000000015b4f5b3 R09: 0000000000000000
[ 1749.050124] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1749.051576] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:20:53 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 15)

12:20:53 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:20:53 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:20:53 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 9)

[ 1749.170971] FAULT_INJECTION: forcing a failure.
[ 1749.170971] name failslab, interval 1, probability 0, space 0, times 0
[ 1749.173452] CPU: 0 PID: 9542 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1749.174827] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1749.176488] Call Trace:
[ 1749.177020]  dump_stack+0x107/0x167
[ 1749.177760]  should_fail.cold+0x5/0xa
[ 1749.178529]  ? create_object.isra.0+0x3a/0xa20
[ 1749.179467]  should_failslab+0x5/0x20
[ 1749.180224]  kmem_cache_alloc+0x5b/0x310
[ 1749.181051]  create_object.isra.0+0x3a/0xa20
[ 1749.181932]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1749.182954]  kmem_cache_alloc+0x159/0x310
[ 1749.183809]  key_alloc+0x3d1/0x1280
[ 1749.184552]  ? key_user_lookup+0x560/0x560
[ 1749.185411]  key_create_or_update+0x6c3/0xc30
[ 1749.186316]  ? key_alloc+0x1280/0x1280
[ 1749.187090]  ? join_session_keyring+0x350/0x350
[ 1749.188023]  ? exc_page_fault+0xca/0x1a0
[ 1749.188854]  ? copy_user_generic_string+0x2c/0x40
[ 1749.189826]  __do_sys_add_key+0x215/0x430
[ 1749.190654]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1749.191592]  ? ksys_write+0x1a9/0x260
[ 1749.192349]  ? __ia32_sys_read+0xb0/0xb0
[ 1749.193161]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1749.194206]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1749.195248]  do_syscall_64+0x33/0x40
[ 1749.195989]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1749.197002] RIP: 0033:0x7f6afab3cb19
[ 1749.197740] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1749.201387] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1749.202891] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1749.204319] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1749.205733] RBP: 00007f6af80b21d0 R08: 000000003f8ba1be R09: 0000000000000000
[ 1749.207150] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1749.208561] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
[ 1749.245783] FAULT_INJECTION: forcing a failure.
[ 1749.245783] name failslab, interval 1, probability 0, space 0, times 0
12:20:53 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1749.248227] CPU: 1 PID: 9547 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1749.249648] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1749.251362] Call Trace:
[ 1749.251917]  dump_stack+0x107/0x167
[ 1749.252674]  should_fail.cold+0x5/0xa
[ 1749.253448]  ? create_object.isra.0+0x3a/0xa20
12:20:53 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1749.254360]  should_failslab+0x5/0x20
[ 1749.255293]  kmem_cache_alloc+0x5b/0x310
[ 1749.256123]  create_object.isra.0+0x3a/0xa20
[ 1749.257009]  ? kasan_unpoison_shadow+0x33/0x50
[ 1749.257956]  kmalloc_order+0xfe/0x160
[ 1749.258734]  kmalloc_order_trace+0x14/0xa0
[ 1749.259623]  dns_resolver_preparse+0x54b/0x8b0
[ 1749.260553]  ? lock_release+0x680/0x680
[ 1749.261374]  ? dns_resolver_free_preparse+0x40/0x40
[ 1749.262381]  ? find_held_lock+0x2c/0x110
[ 1749.263229]  ? down_read+0x10f/0x430
[ 1749.263985]  ? down_write+0x160/0x160
[ 1749.264761]  ? key_task_permission+0x2b5/0x400
[ 1749.265684]  ? dns_resolver_free_preparse+0x40/0x40
[ 1749.266689]  key_create_or_update+0x3e0/0xc30
[ 1749.267620]  ? key_alloc+0x1280/0x1280
[ 1749.268409]  ? join_session_keyring+0x350/0x350
[ 1749.269363]  ? exc_page_fault+0xca/0x1a0
[ 1749.270216]  ? copy_user_generic_string+0x2c/0x40
[ 1749.271244]  __do_sys_add_key+0x215/0x430
[ 1749.272101]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1749.273043]  ? ksys_write+0x1a9/0x260
[ 1749.273822]  ? __ia32_sys_read+0xb0/0xb0
[ 1749.274652]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1749.275746]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1749.276791]  do_syscall_64+0x33/0x40
[ 1749.277549]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1749.278585] RIP: 0033:0x7f4453ef4b19
[ 1749.279350] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1749.283066] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1749.284609] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1749.286046] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1749.287527] RBP: 00007f445146a1d0 R08: 0000000003658378 R09: 0000000000000000
[ 1749.288965] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000001
[ 1749.290400] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:21:07 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:21:07 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:07 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 16)

12:21:07 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:21:07 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:21:07 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:21:07 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:07 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 10)

[ 1763.032328] FAULT_INJECTION: forcing a failure.
[ 1763.032328] name failslab, interval 1, probability 0, space 0, times 0
[ 1763.033607] CPU: 1 PID: 9571 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1763.034347] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1763.035251] Call Trace:
[ 1763.035614]  dump_stack+0x107/0x167
[ 1763.036067]  should_fail.cold+0x5/0xa
[ 1763.036538]  ? assoc_array_insert+0xde/0x2aa0
[ 1763.037097]  should_failslab+0x5/0x20
[ 1763.037571]  kmem_cache_alloc_trace+0x55/0x320
[ 1763.038135]  assoc_array_insert+0xde/0x2aa0
[ 1763.038675]  ? lock_release+0x680/0x680
[ 1763.039166]  ? dns_resolver_preparse+0x60e/0x8b0
[ 1763.039754]  ? lock_release+0x680/0x680
[ 1763.040246]  ? dns_resolver_free_preparse+0x40/0x40
[ 1763.040865]  ? assoc_array_cancel_edit+0x90/0x90
[ 1763.041449]  ? down_write+0xe0/0x160
[ 1763.041908]  ? down_write_killable+0x180/0x180
[ 1763.042473]  ? key_free_user_ns+0x130/0x130
[ 1763.043013]  __key_link_begin+0xec/0x250
[ 1763.043524]  key_create_or_update+0x468/0xc30
[ 1763.044082]  ? key_alloc+0x1280/0x1280
[ 1763.044559]  ? join_session_keyring+0x350/0x350
[ 1763.045135]  ? exc_page_fault+0xca/0x1a0
[ 1763.045653]  ? copy_user_generic_string+0x2c/0x40
[ 1763.046252]  __do_sys_add_key+0x215/0x430
[ 1763.046765]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1763.047354]  ? ksys_write+0x1a9/0x260
[ 1763.047781] FAULT_INJECTION: forcing a failure.
[ 1763.047781] name failslab, interval 1, probability 0, space 0, times 0
[ 1763.047819]  ? __ia32_sys_read+0xb0/0xb0
[ 1763.047840]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1763.051204]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1763.051840]  do_syscall_64+0x33/0x40
[ 1763.052303]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1763.052931] RIP: 0033:0x7f4453ef4b19
[ 1763.053383] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1763.055638] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1763.056572] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1763.057441] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1763.058317] RBP: 00007f445146a1d0 R08: 0000000019841d10 R09: 0000000000000000
[ 1763.059190] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1763.060072] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
[ 1763.060969] CPU: 0 PID: 9567 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1763.062396] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1763.064138] Call Trace:
[ 1763.064691]  dump_stack+0x107/0x167
[ 1763.065455]  should_fail.cold+0x5/0xa
[ 1763.066257]  should_failslab+0x5/0x20
[ 1763.067050]  __kmalloc_track_caller+0x79/0x370
[ 1763.068008]  ? key_alloc+0x42f/0x1280
[ 1763.068816]  kmemdup+0x23/0x50
[ 1763.069475]  key_alloc+0x42f/0x1280
[ 1763.070244]  ? key_user_lookup+0x560/0x560
[ 1763.071115]  key_create_or_update+0x6c3/0xc30
[ 1763.072065]  ? key_alloc+0x1280/0x1280
[ 1763.072840]  ? join_session_keyring+0x350/0x350
[ 1763.073802]  ? exc_page_fault+0xca/0x1a0
[ 1763.074646]  ? copy_user_generic_string+0x2c/0x40
[ 1763.075661]  __do_sys_add_key+0x215/0x430
[ 1763.076503]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1763.077458]  ? ksys_write+0x1a9/0x260
[ 1763.078223]  ? __ia32_sys_read+0xb0/0xb0
[ 1763.079062]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1763.080120]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1763.081186]  do_syscall_64+0x33/0x40
[ 1763.081933]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1763.082987] RIP: 0033:0x7f6afab3cb19
[ 1763.083750] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1763.087497] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1763.087614] Process accounting resumed
[ 1763.089012] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1763.089023] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1763.089034] RBP: 00007f6af80b21d0 R08: 000000001eb0ca6d R09: 0000000000000000
[ 1763.089047] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1763.095237] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:21:07 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:21:07 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:21:07 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowne', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:07 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 11)

12:21:07 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:21:07 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 17)

12:21:07 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:07 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

[ 1763.215161] FAULT_INJECTION: forcing a failure.
[ 1763.215161] name failslab, interval 1, probability 0, space 0, times 0
[ 1763.216427] CPU: 1 PID: 9586 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1763.217178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1763.218038] Call Trace:
[ 1763.218333]  dump_stack+0x107/0x167
[ 1763.218721]  should_fail.cold+0x5/0xa
[ 1763.219136]  ? create_object.isra.0+0x3a/0xa20
[ 1763.219632]  should_failslab+0x5/0x20
[ 1763.220048]  kmem_cache_alloc+0x5b/0x310
[ 1763.220480]  create_object.isra.0+0x3a/0xa20
[ 1763.220959]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1763.221494]  __kmalloc_track_caller+0x177/0x370
[ 1763.222005]  ? key_alloc+0x42f/0x1280
[ 1763.222416]  kmemdup+0x23/0x50
[ 1763.222774]  key_alloc+0x42f/0x1280
[ 1763.223162]  ? key_user_lookup+0x560/0x560
[ 1763.223648]  key_create_or_update+0x6c3/0xc30
[ 1763.224103]  ? key_alloc+0x1280/0x1280
[ 1763.224545]  ? join_session_keyring+0x350/0x350
[ 1763.225038]  ? exc_page_fault+0xca/0x1a0
[ 1763.225514]  ? copy_user_generic_string+0x2c/0x40
[ 1763.226015]  __do_sys_add_key+0x215/0x430
[ 1763.226480]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1763.226968]  ? ksys_write+0x1a9/0x260
[ 1763.227401]  ? __ia32_sys_read+0xb0/0xb0
[ 1763.227827]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1763.228408]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1763.228728] FAULT_INJECTION: forcing a failure.
[ 1763.228728] name failslab, interval 1, probability 0, space 0, times 0
[ 1763.228950]  do_syscall_64+0x33/0x40
[ 1763.231680]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1763.232212] RIP: 0033:0x7f6afab3cb19
[ 1763.232601] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1763.234491] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1763.235278] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1763.236019] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1763.236756] RBP: 00007f6af80b21d0 R08: 0000000036d13387 R09: 0000000000000000
[ 1763.237495] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1763.238229] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
[ 1763.238991] CPU: 0 PID: 9583 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1763.240454] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1763.242204] Call Trace:
[ 1763.242770]  dump_stack+0x107/0x167
[ 1763.243554]  should_fail.cold+0x5/0xa
[ 1763.244364]  ? create_object.isra.0+0x3a/0xa20
[ 1763.245333]  should_failslab+0x5/0x20
[ 1763.246136]  kmem_cache_alloc+0x5b/0x310
[ 1763.247009]  create_object.isra.0+0x3a/0xa20
[ 1763.247952]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1763.249032]  kmem_cache_alloc_trace+0x151/0x320
[ 1763.250026]  assoc_array_insert+0xde/0x2aa0
[ 1763.250944]  ? lock_release+0x680/0x680
[ 1763.251812]  ? dns_resolver_preparse+0x60e/0x8b0
[ 1763.252815]  ? lock_release+0x680/0x680
[ 1763.253667]  ? dns_resolver_free_preparse+0x40/0x40
[ 1763.254725]  ? assoc_array_cancel_edit+0x90/0x90
[ 1763.255744]  ? down_write+0xe0/0x160
[ 1763.256534]  ? down_write_killable+0x180/0x180
[ 1763.257504]  ? key_free_user_ns+0x130/0x130
[ 1763.258428]  __key_link_begin+0xec/0x250
[ 1763.259302]  key_create_or_update+0x468/0xc30
[ 1763.260271]  ? key_alloc+0x1280/0x1280
[ 1763.261094]  ? join_session_keyring+0x350/0x350
[ 1763.262079]  ? exc_page_fault+0xca/0x1a0
[ 1763.262964]  ? copy_user_generic_string+0x2c/0x40
[ 1763.264007]  __do_sys_add_key+0x215/0x430
[ 1763.264888]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1763.265866]  ? ksys_write+0x1a9/0x260
[ 1763.266671]  ? __ia32_sys_read+0xb0/0xb0
[ 1763.267545]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1763.268651]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1763.269748]  do_syscall_64+0x33/0x40
[ 1763.270536]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1763.271635] RIP: 0033:0x7f4453ef4b19
[ 1763.272424] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1763.276308] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1763.277915] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1763.279430] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1763.280937] RBP: 00007f445146a1d0 R08: 00000000148ce0c4 R09: 0000000000000000
[ 1763.282441] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1763.283963] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:21:07 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:21:07 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:21:07 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 18)

12:21:07 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:07 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:21:07 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:21:07 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1763.387266] FAULT_INJECTION: forcing a failure.
[ 1763.387266] name failslab, interval 1, probability 0, space 0, times 0
[ 1763.390063] CPU: 0 PID: 9593 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1763.391839] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1763.393664] Call Trace:
[ 1763.394358]  dump_stack+0x107/0x167
[ 1763.395175]  should_fail.cold+0x5/0xa
[ 1763.396045]  ? selinux_key_alloc+0x46/0x1b0
[ 1763.397011]  should_failslab+0x5/0x20
[ 1763.397859]  kmem_cache_alloc_trace+0x55/0x320
[ 1763.398881]  selinux_key_alloc+0x46/0x1b0
[ 1763.399817]  security_key_alloc+0x56/0xb0
[ 1763.400738]  key_alloc+0x8a3/0x1280
[ 1763.401572]  ? key_user_lookup+0x560/0x560
[ 1763.402532]  key_create_or_update+0x6c3/0xc30
[ 1763.403572]  ? key_alloc+0x1280/0x1280
[ 1763.404436]  ? join_session_keyring+0x350/0x350
[ 1763.405473]  ? exc_page_fault+0xca/0x1a0
[ 1763.406415]  ? copy_user_generic_string+0x2c/0x40
[ 1763.407508]  __do_sys_add_key+0x215/0x430
[ 1763.408430]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1763.409462]  ? ksys_write+0x1a9/0x260
[ 1763.410305]  ? __ia32_sys_read+0xb0/0xb0
[ 1763.411211]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1763.412379]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1763.413536]  do_syscall_64+0x33/0x40
[ 1763.414361]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1763.415510] RIP: 0033:0x7f6afab3cb19
[ 1763.416335] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1763.420381] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1763.422068] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1763.423650] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1763.425212] RBP: 00007f6af80b21d0 R08: 0000000016972ebc R09: 0000000000000000
[ 1763.426784] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1763.428376] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:21:07 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:21:07 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:07 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:07 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:21 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 12)

12:21:21 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:21:21 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 19)

12:21:21 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:21:21 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:21 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:21 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:21 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1776.934822] FAULT_INJECTION: forcing a failure.
[ 1776.934822] name failslab, interval 1, probability 0, space 0, times 0
[ 1776.937285] CPU: 1 PID: 9621 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1776.938670] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1776.940370] Call Trace:
[ 1776.940917]  dump_stack+0x107/0x167
[ 1776.941665]  should_fail.cold+0x5/0xa
[ 1776.942446]  ? create_object.isra.0+0x3a/0xa20
[ 1776.943379]  should_failslab+0x5/0x20
[ 1776.944180]  kmem_cache_alloc+0x5b/0x310
[ 1776.945016]  create_object.isra.0+0x3a/0xa20
[ 1776.945909]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1776.946948]  kmem_cache_alloc_trace+0x151/0x320
[ 1776.947911]  selinux_key_alloc+0x46/0x1b0
[ 1776.948753]  security_key_alloc+0x56/0xb0
[ 1776.949599]  key_alloc+0x8a3/0x1280
[ 1776.950356]  ? key_user_lookup+0x560/0x560
[ 1776.950733] FAULT_INJECTION: forcing a failure.
[ 1776.950733] name failslab, interval 1, probability 0, space 0, times 0
[ 1776.951227]  key_create_or_update+0x6c3/0xc30
[ 1776.954354]  ? key_alloc+0x1280/0x1280
[ 1776.955158]  ? join_session_keyring+0x350/0x350
[ 1776.956111]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1776.957215]  ? copy_user_generic_string+0x2c/0x40
[ 1776.958201]  __do_sys_add_key+0x215/0x430
[ 1776.959051]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1776.959996]  ? ksys_write+0x1a9/0x260
[ 1776.960774]  ? __ia32_sys_read+0xb0/0xb0
[ 1776.961606]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1776.962668]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1776.963734]  do_syscall_64+0x33/0x40
[ 1776.964492]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1776.965532] RIP: 0033:0x7f6afab3cb19
[ 1776.966285] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1776.969998] RSP: 002b:00007f6af80b2188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1776.971548] RAX: ffffffffffffffda RBX: 00007f6afac4ff60 RCX: 00007f6afab3cb19
[ 1776.972988] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1776.974438] RBP: 00007f6af80b21d0 R08: 000000000eb09bd0 R09: 0000000000000000
[ 1776.975895] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1776.977335] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
[ 1776.978826] CPU: 0 PID: 9631 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1776.980233] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1776.981918] Call Trace:
[ 1776.982460]  dump_stack+0x107/0x167
[ 1776.983203]  should_fail.cold+0x5/0xa
[ 1776.984013]  ? assoc_array_insert+0x73f/0x2aa0
[ 1776.984944]  should_failslab+0x5/0x20
[ 1776.985730]  kmem_cache_alloc_trace+0x55/0x320
[ 1776.986662]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1776.987726]  assoc_array_insert+0x73f/0x2aa0
[ 1776.988623]  ? lock_release+0x680/0x680
[ 1776.989436]  ? dns_resolver_preparse+0x60e/0x8b0
[ 1776.990395]  ? lock_release+0x680/0x680
[ 1776.991216]  ? dns_resolver_free_preparse+0x40/0x40
[ 1776.992236]  ? assoc_array_cancel_edit+0x90/0x90
[ 1776.993203]  ? down_write+0xe0/0x160
[ 1776.993958]  ? down_write_killable+0x180/0x180
[ 1776.994884]  ? key_free_user_ns+0x130/0x130
[ 1776.995782]  __key_link_begin+0xec/0x250
[ 1776.996609]  key_create_or_update+0x468/0xc30
[ 1776.997526]  ? key_alloc+0x1280/0x1280
[ 1776.998316]  ? join_session_keyring+0x350/0x350
[ 1776.999260]  ? exc_page_fault+0xca/0x1a0
[ 1777.000122]  ? copy_user_generic_string+0x2c/0x40
[ 1777.001114]  __do_sys_add_key+0x215/0x430
[ 1777.001960]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1777.002902]  ? ksys_write+0x1a9/0x260
[ 1777.003680]  ? __ia32_sys_read+0xb0/0xb0
[ 1777.004507]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1777.005569]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1777.006617]  do_syscall_64+0x33/0x40
[ 1777.007372]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1777.008420] RIP: 0033:0x7f4453ef4b19
12:21:21 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1777.009178] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1777.013039] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1777.014580] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1777.016050] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1777.017487] RBP: 00007f445146a1d0 R08: 0000000017972fde R09: 0000000000000000
[ 1777.018934] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1777.020380] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:21:21 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:21:21 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:21 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:21:21 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:21 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:21:34 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 13)

12:21:34 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:34 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 20)

12:21:34 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:34 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:21:34 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:21:34 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:21:34 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

[ 1790.269911] FAULT_INJECTION: forcing a failure.
[ 1790.269911] name failslab, interval 1, probability 0, space 0, times 0
[ 1790.272299] CPU: 1 PID: 9654 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1790.273702] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1790.275422] Call Trace:
[ 1790.275977]  dump_stack+0x107/0x167
[ 1790.276743]  should_fail.cold+0x5/0xa
[ 1790.277530]  ? create_object.isra.0+0x3a/0xa20
[ 1790.278479]  should_failslab+0x5/0x20
[ 1790.279284]  kmem_cache_alloc+0x5b/0x310
[ 1790.280143]  ? mark_held_locks+0x9e/0xe0
[ 1790.280989]  create_object.isra.0+0x3a/0xa20
[ 1790.281898]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1790.282949]  kmem_cache_alloc_trace+0x151/0x320
[ 1790.283929]  assoc_array_insert+0x73f/0x2aa0
[ 1790.284842]  ? lock_release+0x680/0x680
[ 1790.285668]  ? dns_resolver_preparse+0x60e/0x8b0
[ 1790.286640]  ? lock_release+0x680/0x680
[ 1790.287467]  ? dns_resolver_free_preparse+0x40/0x40
[ 1790.288488]  ? assoc_array_cancel_edit+0x90/0x90
[ 1790.289471]  ? down_write+0xe0/0x160
[ 1790.290236]  ? down_write_killable+0x180/0x180
[ 1790.291177]  ? key_free_user_ns+0x130/0x130
[ 1790.292092]  __key_link_begin+0xec/0x250
[ 1790.292932]  key_create_or_update+0x468/0xc30
[ 1790.293861]  ? key_alloc+0x1280/0x1280
[ 1790.294662]  ? join_session_keyring+0x350/0x350
[ 1790.295622]  ? exc_page_fault+0xca/0x1a0
[ 1790.296492]  ? copy_user_generic_string+0x2c/0x40
[ 1790.297495]  __do_sys_add_key+0x215/0x430
[ 1790.298353]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1790.299309]  ? ksys_write+0x1a9/0x260
[ 1790.300102]  ? __ia32_sys_read+0xb0/0xb0
[ 1790.300944]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1790.302021]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1790.303086]  do_syscall_64+0x33/0x40
[ 1790.303874]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1790.304929] RIP: 0033:0x7f4453ef4b19
[ 1790.305695] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1790.309470] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1790.311034] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1790.312507] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1790.313969] RBP: 00007f445146a1d0 R08: 0000000000647e05 R09: 0000000000000000
[ 1790.315432] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1790.316912] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:21:34 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:34 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1790.328448] FAULT_INJECTION: forcing a failure.
[ 1790.328448] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1790.330967] CPU: 1 PID: 9657 Comm: syz-executor.6 Not tainted 5.10.184 #1
[ 1790.332384] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1790.334088] Call Trace:
[ 1790.334647]  dump_stack+0x107/0x167
[ 1790.335405]  should_fail.cold+0x5/0xa
[ 1790.336233]  _copy_to_user+0x2e/0x180
[ 1790.337026]  simple_read_from_buffer+0xcc/0x160
[ 1790.337988]  proc_fail_nth_read+0x198/0x230
[ 1790.338914]  ? proc_sessionid_read+0x230/0x230
[ 1790.339867]  ? security_file_permission+0x24e/0x570
[ 1790.340897]  ? perf_trace_initcall_start+0x101/0x380
[ 1790.341951]  ? proc_sessionid_read+0x230/0x230
[ 1790.342888]  vfs_read+0x228/0x580
[ 1790.343608]  ksys_read+0x12d/0x260
[ 1790.344346]  ? vfs_write+0xa70/0xa70
[ 1790.345119]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1790.346212]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1790.347285]  do_syscall_64+0x33/0x40
[ 1790.348071]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1790.349136] RIP: 0033:0x7f6afaaef69c
[ 1790.349904] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 1790.353710] RSP: 002b:00007f6af80b2170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 1790.355284] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f6afaaef69c
[ 1790.356766] RDX: 000000000000000f RSI: 00007f6af80b21e0 RDI: 0000000000000003
[ 1790.358230] RBP: 00007f6af80b21d0 R08: 0000000000000000 R09: 0000000000000000
[ 1790.359712] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1790.361179] R13: 00007ffcb40f748f R14: 00007f6af80b2300 R15: 0000000000022000
12:21:34 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:21:34 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:34 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 14)

12:21:34 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:21:34 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:21:34 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1790.511012] FAULT_INJECTION: forcing a failure.
[ 1790.511012] name failslab, interval 1, probability 0, space 0, times 0
[ 1790.512820] CPU: 1 PID: 9682 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1790.513853] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1790.515121] Call Trace:
[ 1790.515520]  dump_stack+0x107/0x167
[ 1790.516097]  should_fail.cold+0x5/0xa
[ 1790.516668]  ? key_alloc+0x3d1/0x1280
[ 1790.517249]  should_failslab+0x5/0x20
[ 1790.517825]  kmem_cache_alloc+0x5b/0x310
[ 1790.518453]  key_alloc+0x3d1/0x1280
[ 1790.519016]  ? key_user_lookup+0x560/0x560
[ 1790.519695]  key_create_or_update+0x6c3/0xc30
[ 1790.520382]  ? key_alloc+0x1280/0x1280
[ 1790.520968]  ? join_session_keyring+0x350/0x350
[ 1790.521688]  ? exc_page_fault+0xca/0x1a0
[ 1790.522335]  ? copy_user_generic_string+0x2c/0x40
[ 1790.523093]  __do_sys_add_key+0x215/0x430
[ 1790.523733]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1790.524435]  ? ksys_write+0x1a9/0x260
[ 1790.525011]  ? __ia32_sys_read+0xb0/0xb0
[ 1790.525632]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1790.526420]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1790.527194]  do_syscall_64+0x33/0x40
[ 1790.527768]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1790.528555] RIP: 0033:0x7f4453ef4b19
[ 1790.529121] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1790.531836] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1790.532987] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1790.534073] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1790.535154] RBP: 00007f445146a1d0 R08: 00000000240f359d R09: 0000000000000000
[ 1790.536266] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1790.537339] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:21:50 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:21:50 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:50 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 15)

12:21:50 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:21:50 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:21:50 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x7c, 0x2)

12:21:50 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:21:50 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1806.550795] FAULT_INJECTION: forcing a failure.
[ 1806.550795] name failslab, interval 1, probability 0, space 0, times 0
[ 1806.553272] CPU: 0 PID: 9695 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1806.554698] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1806.556466] Call Trace:
[ 1806.557033]  dump_stack+0x107/0x167
[ 1806.557809]  should_fail.cold+0x5/0xa
[ 1806.558613]  ? create_object.isra.0+0x3a/0xa20
[ 1806.559580]  should_failslab+0x5/0x20
[ 1806.560396]  kmem_cache_alloc+0x5b/0x310
[ 1806.561272]  create_object.isra.0+0x3a/0xa20
[ 1806.562215]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1806.563313]  kmem_cache_alloc+0x159/0x310
[ 1806.564289]  key_alloc+0x3d1/0x1280
12:21:50 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1806.565087]  ? key_user_lookup+0x560/0x560
[ 1806.566124]  key_create_or_update+0x6c3/0xc30
[ 1806.567108]  ? key_alloc+0x1280/0x1280
[ 1806.568013]  ? join_session_keyring+0x350/0x350
[ 1806.569008]  ? exc_page_fault+0xca/0x1a0
[ 1806.569901]  ? copy_user_generic_string+0x2c/0x40
[ 1806.570938]  __do_sys_add_key+0x215/0x430
[ 1806.571823]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1806.572821]  ? ksys_write+0x1a9/0x260
[ 1806.573630]  ? __ia32_sys_read+0xb0/0xb0
[ 1806.574521]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1806.575643]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1806.576769]  do_syscall_64+0x33/0x40
[ 1806.577566]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1806.578658] RIP: 0033:0x7f4453ef4b19
[ 1806.579457] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1806.583237] Process accounting paused
[ 1806.583379] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1806.583409] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1806.587211] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1806.588743] RBP: 00007f445146a1d0 R08: 000000001a160467 R09: 0000000000000000
[ 1806.590248] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1806.591762] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:22:07 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2)

12:22:07 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 16)

12:22:07 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:07 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:22:07 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:07 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:07 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:22:07 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

[ 1822.955110] FAULT_INJECTION: forcing a failure.
[ 1822.955110] name failslab, interval 1, probability 0, space 0, times 0
[ 1822.957599] CPU: 1 PID: 9722 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1822.958996] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1822.960730] Call Trace:
[ 1822.961273]  dump_stack+0x107/0x167
[ 1822.962020]  should_fail.cold+0x5/0xa
[ 1822.962808]  should_failslab+0x5/0x20
[ 1822.963579]  __kmalloc_track_caller+0x79/0x370
[ 1822.964510]  ? key_alloc+0x42f/0x1280
[ 1822.965294]  kmemdup+0x23/0x50
[ 1822.965948]  key_alloc+0x42f/0x1280
[ 1822.966709]  ? key_user_lookup+0x560/0x560
[ 1822.967586]  key_create_or_update+0x6c3/0xc30
[ 1822.968553]  ? key_alloc+0x1280/0x1280
[ 1822.969359]  ? join_session_keyring+0x350/0x350
[ 1822.970314]  ? exc_page_fault+0xca/0x1a0
[ 1822.971160]  ? copy_user_generic_string+0x2c/0x40
[ 1822.972170]  __do_sys_add_key+0x215/0x430
[ 1822.973012]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1822.973952]  ? ksys_write+0x1a9/0x260
[ 1822.974726]  ? __ia32_sys_read+0xb0/0xb0
[ 1822.975558]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1822.976631]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1822.977677]  do_syscall_64+0x33/0x40
[ 1822.978451]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1822.979487] RIP: 0033:0x7f4453ef4b19
[ 1822.980269] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1822.983974] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1822.985517] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1822.986955] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1822.988406] RBP: 00007f445146a1d0 R08: 0000000012305f7b R09: 0000000000000000
[ 1822.989832] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1822.991256] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:22:07 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:22:07 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:22:07 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:07 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:22:07 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 17)

12:22:07 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1823.174480] FAULT_INJECTION: forcing a failure.
[ 1823.174480] name failslab, interval 1, probability 0, space 0, times 0
[ 1823.176961] CPU: 0 PID: 9736 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1823.178437] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1823.180244] Call Trace:
[ 1823.180822]  dump_stack+0x107/0x167
[ 1823.181618]  should_fail.cold+0x5/0xa
[ 1823.182451]  ? create_object.isra.0+0x3a/0xa20
[ 1823.183444]  should_failslab+0x5/0x20
[ 1823.184279]  kmem_cache_alloc+0x5b/0x310
[ 1823.185172]  create_object.isra.0+0x3a/0xa20
[ 1823.186121]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1823.187224]  __kmalloc_track_caller+0x177/0x370
[ 1823.188270]  ? key_alloc+0x42f/0x1280
[ 1823.189097]  kmemdup+0x23/0x50
[ 1823.189810]  key_alloc+0x42f/0x1280
[ 1823.190610]  ? key_user_lookup+0x560/0x560
[ 1823.191559]  key_create_or_update+0x6c3/0xc30
[ 1823.192531]  ? key_alloc+0x1280/0x1280
[ 1823.193361]  ? join_session_keyring+0x350/0x350
[ 1823.194379]  ? exc_page_fault+0xca/0x1a0
[ 1823.195273]  ? copy_user_generic_string+0x2c/0x40
[ 1823.196338]  __do_sys_add_key+0x215/0x430
[ 1823.197243]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1823.198247]  ? ksys_write+0x1a9/0x260
[ 1823.199078]  ? __ia32_sys_read+0xb0/0xb0
[ 1823.199971]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1823.201134]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1823.202265]  do_syscall_64+0x33/0x40
[ 1823.203069]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1823.204192] RIP: 0033:0x7f4453ef4b19
[ 1823.205000] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1823.208975] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1823.210603] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1823.212133] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1823.213656] RBP: 00007f445146a1d0 R08: 000000003b3c87a0 R09: 0000000000000000
[ 1823.215189] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1823.216745] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:22:07 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x3}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:07 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x0)

12:22:07 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:22:07 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:22:07 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 18)

12:22:07 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

[ 1823.450746] FAULT_INJECTION: forcing a failure.
[ 1823.450746] name failslab, interval 1, probability 0, space 0, times 0
[ 1823.453458] CPU: 0 PID: 9751 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1823.454920] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1823.456731] Call Trace:
[ 1823.457304]  dump_stack+0x107/0x167
[ 1823.458102]  should_fail.cold+0x5/0xa
[ 1823.458923]  ? selinux_key_alloc+0x46/0x1b0
[ 1823.459881]  should_failslab+0x5/0x20
[ 1823.460724]  kmem_cache_alloc_trace+0x55/0x320
[ 1823.461713]  selinux_key_alloc+0x46/0x1b0
[ 1823.462626]  security_key_alloc+0x56/0xb0
[ 1823.463540]  key_alloc+0x8a3/0x1280
[ 1823.464371]  ? key_user_lookup+0x560/0x560
[ 1823.465305]  key_create_or_update+0x6c3/0xc30
[ 1823.466290]  ? key_alloc+0x1280/0x1280
[ 1823.467124]  ? join_session_keyring+0x350/0x350
[ 1823.468160]  ? exc_page_fault+0xca/0x1a0
[ 1823.469068]  ? copy_user_generic_string+0x2c/0x40
[ 1823.470134]  __do_sys_add_key+0x215/0x430
[ 1823.471042]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1823.472059]  ? ksys_write+0x1a9/0x260
[ 1823.472899]  ? __ia32_sys_read+0xb0/0xb0
[ 1823.473791]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1823.474933]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1823.476064]  do_syscall_64+0x33/0x40
[ 1823.476882]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1823.477999] RIP: 0033:0x7f4453ef4b19
[ 1823.478793] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1823.482726] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1823.484376] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1823.485924] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1823.487468] RBP: 00007f445146a1d0 R08: 000000001a7b4175 R09: 0000000000000000
[ 1823.489031] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1823.490568] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:22:21 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:21 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:22:21 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 19)

12:22:21 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:22:21 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x65}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:21 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x0)

12:22:21 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x5c, 0x2)

12:22:21 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1837.095622] Process accounting resumed
[ 1837.117932] FAULT_INJECTION: forcing a failure.
[ 1837.117932] name failslab, interval 1, probability 0, space 0, times 0
12:22:21 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a404c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

[ 1837.120463] CPU: 0 PID: 9768 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1837.121953] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1837.123633] Call Trace:
[ 1837.124181]  dump_stack+0x107/0x167
[ 1837.124932]  should_fail.cold+0x5/0xa
[ 1837.125716]  ? create_object.isra.0+0x3a/0xa20
[ 1837.126661]  should_failslab+0x5/0x20
[ 1837.127425]  kmem_cache_alloc+0x5b/0x310
[ 1837.128272]  create_object.isra.0+0x3a/0xa20
[ 1837.129168]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1837.130218]  kmem_cache_alloc_trace+0x151/0x320
[ 1837.131180]  selinux_key_alloc+0x46/0x1b0
[ 1837.132032]  security_key_alloc+0x56/0xb0
[ 1837.132895]  key_alloc+0x8a3/0x1280
[ 1837.133652]  ? key_user_lookup+0x560/0x560
[ 1837.134523]  key_create_or_update+0x6c3/0xc30
[ 1837.135430]  ? key_alloc+0x1280/0x1280
[ 1837.136213]  ? join_session_keyring+0x350/0x350
[ 1837.137174]  ? exc_page_fault+0xca/0x1a0
[ 1837.138024]  ? copy_user_generic_string+0x2c/0x40
[ 1837.139040]  __do_sys_add_key+0x215/0x430
[ 1837.139892]  ? __do_sys_request_key+0x3b0/0x3b0
[ 1837.140875]  ? ksys_write+0x1a9/0x260
[ 1837.141657]  ? __ia32_sys_read+0xb0/0xb0
[ 1837.142509]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1837.143577]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1837.144679]  do_syscall_64+0x33/0x40
[ 1837.145440]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1837.146507] RIP: 0033:0x7f4453ef4b19
[ 1837.147266] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1837.150956] RSP: 002b:00007f445146a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8
[ 1837.152513] RAX: ffffffffffffffda RBX: 00007f4454007f60 RCX: 00007f4453ef4b19
[ 1837.153938] RDX: 0000000020000340 RSI: 0000000020000100 RDI: 00000000200000c0
[ 1837.155372] RBP: 00007f445146a1d0 R08: 0000000024190d9b R09: 0000000000000000
[ 1837.156795] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1837.158253] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:22:34 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:22:34 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:34 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x0)

12:22:34 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:34 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0) (fail_nth: 20)

12:22:34 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:22:34 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:22:34 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a410c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

[ 1849.889739] FAULT_INJECTION: forcing a failure.
[ 1849.889739] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1849.892105] CPU: 0 PID: 9790 Comm: syz-executor.7 Not tainted 5.10.184 #1
[ 1849.893502] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1849.895150] Call Trace:
[ 1849.895697]  dump_stack+0x107/0x167
[ 1849.896449]  should_fail.cold+0x5/0xa
[ 1849.897247]  _copy_to_user+0x2e/0x180
[ 1849.898019]  simple_read_from_buffer+0xcc/0x160
[ 1849.898972]  proc_fail_nth_read+0x198/0x230
[ 1849.899833]  ? proc_sessionid_read+0x230/0x230
[ 1849.900773]  ? security_file_permission+0x24e/0x570
[ 1849.901757]  ? perf_trace_initcall_start+0x101/0x380
[ 1849.902798]  ? proc_sessionid_read+0x230/0x230
[ 1849.903710]  vfs_read+0x228/0x580
[ 1849.904424]  ksys_read+0x12d/0x260
[ 1849.905155]  ? vfs_write+0xa70/0xa70
[ 1849.905928]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1849.906970]  ? syscall_enter_from_user_mode+0x1d/0x50
[ 1849.908022]  do_syscall_64+0x33/0x40
[ 1849.908767]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1849.909806] RIP: 0033:0x7f4453ea769c
[ 1849.910540] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48
[ 1849.914302] RSP: 002b:00007f445146a170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000
[ 1849.915820] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007f4453ea769c
[ 1849.917294] RDX: 000000000000000f RSI: 00007f445146a1e0 RDI: 0000000000000003
[ 1849.918738] RBP: 00007f445146a1d0 R08: 0000000000000000 R09: 0000000000000000
12:22:34 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1849.920183] R10: 00000000000fffff R11: 0000000000000246 R12: 0000000000000002
[ 1849.921755] R13: 00007ffccaa788df R14: 00007f445146a300 R15: 0000000000022000
12:22:34 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:22:34 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:22:34 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:22:34 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7027255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:34 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB, @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:34 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:34 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x0, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:22:34 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:49 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7047255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:49 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:49 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2)

12:22:49 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:49 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:49 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:22:49 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:22:49 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:22:49 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:22:49 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:22:49 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7057255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:49 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}]}, 0x64, 0x2)

12:22:49 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:49 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:22:49 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7067255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:22:49 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fow', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:22:49 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:22:49 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:22:49 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:22:49 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x3}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:03 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2, 0x65}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:03 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fow', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:03 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}]}, 0x64, 0x2)

12:23:03 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:23:03 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:23:03 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7077255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:03 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:03 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:03 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a410c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

[ 1879.527104] Process accounting paused
12:23:17 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}]}, 0x64, 0x2)

12:23:17 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:17 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fow', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:17 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:23:17 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab70a7255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:17 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:17 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7027255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:17 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:23:17 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:17 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7047255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:17 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7107255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:18 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:18 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:23:18 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:23:18 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x0)

12:23:18 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x0, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:18 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:18 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7057255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:18 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db441000824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:18 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440502824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:18 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:23:18 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7067255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:18 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:18 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:23:18 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:23:32 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440503824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:32 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:23:32 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x0)

12:23:32 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x2)

12:23:32 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7077255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:32 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:23:32 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:23:32 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:48 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440565824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:48 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:23:48 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x4c, 0x2)

12:23:48 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab70a7255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:48 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x0)

12:23:48 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x54, 0x2)

12:23:48 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:48 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:48 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:48 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824002767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:48 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:48 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7107255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:48 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x4c, 0x2)

[ 1924.311987] Process accounting resumed
12:23:48 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:48 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:23:48 executing program 0:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:48 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x4c, 0x2)

12:23:48 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:23:48 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824003767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:23:48 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:23:48 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db441000824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:10 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}}, 0x4c, 0x2)

12:24:10 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x0, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:10 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:10 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440502824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:10 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:24:10 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:24:10 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824004767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:10 executing program 0:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowne', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:10 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:24:10 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440503824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:10 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824010767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:11 executing program 1:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:24:11 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:24:27 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:24:27 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440565824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:27 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:24:27 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 1)

12:24:27 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:27 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 1)

12:24:27 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269020f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:27 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}}, 0x4c, 0x2)

[ 1963.218927] FAULT_INJECTION: forcing a failure.
[ 1963.218927] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1963.221419] CPU: 1 PID: 10081 Comm: syz-executor.0 Not tainted 5.10.184 #1
[ 1963.222828] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1963.224518] Call Trace:
[ 1963.225068]  dump_stack+0x107/0x167
[ 1963.225812]  should_fail.cold+0x5/0xa
[ 1963.226608]  strncpy_from_user+0x34/0x470
[ 1963.227457]  setxattr+0xc8/0x330
[ 1963.228150]  ? vfs_setxattr+0x270/0x270
[ 1963.228954]  ? find_held_lock+0x2c/0x110
[ 1963.229783]  ? lock_acquire+0x197/0x470
[ 1963.230633]  ? __x64_sys_fsetxattr+0x176/0x290
[ 1963.231567]  ? lock_release+0x680/0x680
[ 1963.232385]  ? __fget_files+0x296/0x4c0
[ 1963.233209]  ? __mnt_want_write+0x196/0x280
[ 1963.234106]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1963.235041]  do_syscall_64+0x33/0x40
[ 1963.235805]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1963.236862] RIP: 0033:0x7f0e44587b19
[ 1963.237616] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1963.241337] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1963.242877] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19
[ 1963.244311] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1963.245754] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000
[ 1963.247196] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001
[ 1963.248631] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000
12:24:27 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269030f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:27 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}}, 0x4c, 0x2)

12:24:27 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

[ 1963.333340] FAULT_INJECTION: forcing a failure.
[ 1963.333340] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1963.336911] CPU: 1 PID: 10082 Comm: syz-executor.1 Not tainted 5.10.184 #1
[ 1963.338332] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1963.340022] Call Trace:
[ 1963.340604]  dump_stack+0x107/0x167
[ 1963.341349]  should_fail.cold+0x5/0xa
[ 1963.342131]  strncpy_from_user+0x34/0x470
[ 1963.342985]  setxattr+0xc8/0x330
[ 1963.343674]  ? vfs_setxattr+0x270/0x270
[ 1963.344482]  ? find_held_lock+0x2c/0x110
[ 1963.345313]  ? lock_acquire+0x197/0x470
[ 1963.346124]  ? __x64_sys_fsetxattr+0x176/0x290
[ 1963.347050]  ? lock_release+0x680/0x680
[ 1963.347853]  ? __fget_files+0x296/0x4c0
[ 1963.348661]  ? __mnt_want_write+0x196/0x280
[ 1963.349545]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1963.350457]  do_syscall_64+0x33/0x40
[ 1963.351207]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1963.352238] RIP: 0033:0x7f1be77ddb19
[ 1963.352989] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1963.356724] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1963.358277] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19
[ 1963.359731] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1963.361181] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000
[ 1963.362643] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001
[ 1963.364074] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000
12:24:27 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824002767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:27 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:27 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 2)

12:24:27 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269040f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:27 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:27 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1963.485539] FAULT_INJECTION: forcing a failure.
[ 1963.485539] name failslab, interval 1, probability 0, space 0, times 0
[ 1963.488115] CPU: 1 PID: 10096 Comm: syz-executor.0 Not tainted 5.10.184 #1
[ 1963.489652] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1963.491420] Call Trace:
[ 1963.491985]  dump_stack+0x107/0x167
[ 1963.492757]  should_fail.cold+0x5/0xa
[ 1963.493616]  ? kvmalloc_node+0x119/0x170
[ 1963.494487]  should_failslab+0x5/0x20
[ 1963.495315]  __kmalloc_node+0x76/0x420
[ 1963.496135]  kvmalloc_node+0x119/0x170
[ 1963.496991]  setxattr+0x14e/0x330
[ 1963.497723]  ? vfs_setxattr+0x270/0x270
[ 1963.498609]  ? find_held_lock+0x2c/0x110
[ 1963.499470]  ? lock_acquire+0x197/0x470
[ 1963.500339]  ? __x64_sys_fsetxattr+0x176/0x290
[ 1963.501297]  ? lock_release+0x680/0x680
[ 1963.502180]  ? __fget_files+0x296/0x4c0
[ 1963.503058]  ? __mnt_want_write+0x196/0x280
[ 1963.504004]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1963.504970]  do_syscall_64+0x33/0x40
[ 1963.505777]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1963.506898] RIP: 0033:0x7f0e44587b19
[ 1963.507696] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1963.511643] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1963.513271] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19
[ 1963.514822] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1963.516369] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000
[ 1963.517913] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001
[ 1963.519443] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000
12:24:27 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:27 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0)

[ 1963.625331] Process accounting paused
12:24:40 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824003767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:40 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 2)

12:24:40 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 3)

12:24:40 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:40 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x0, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:40 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:24:40 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269100f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:40 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0) (fail_nth: 1)

[ 1976.549587] FAULT_INJECTION: forcing a failure.
[ 1976.549587] name failslab, interval 1, probability 0, space 0, times 0
[ 1976.551976] CPU: 1 PID: 10129 Comm: syz-executor.0 Not tainted 5.10.184 #1
[ 1976.553397] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1976.555108] Call Trace:
[ 1976.555663]  dump_stack+0x107/0x167
[ 1976.556435]  should_fail.cold+0x5/0xa
[ 1976.557223]  ? create_object.isra.0+0x3a/0xa20
[ 1976.558198]  should_failslab+0x5/0x20
[ 1976.558975]  kmem_cache_alloc+0x5b/0x310
[ 1976.559797]  ? lock_downgrade+0x6d0/0x6d0
[ 1976.560662]  create_object.isra.0+0x3a/0xa20
[ 1976.561572]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1976.562637]  __kmalloc_node+0x1ae/0x420
[ 1976.563486]  kvmalloc_node+0x119/0x170
[ 1976.564290]  setxattr+0x14e/0x330
[ 1976.565021]  ? vfs_setxattr+0x270/0x270
[ 1976.565847]  ? find_held_lock+0x2c/0x110
[ 1976.566706]  ? lock_acquire+0x197/0x470
[ 1976.567525]  ? __x64_sys_fsetxattr+0x176/0x290
[ 1976.568466]  ? lock_release+0x680/0x680
[ 1976.569282]  ? __fget_files+0x296/0x4c0
[ 1976.570109]  ? __mnt_want_write+0x196/0x280
[ 1976.571004]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1976.571907]  do_syscall_64+0x33/0x40
[ 1976.572660]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1976.573700] RIP: 0033:0x7f0e44587b19
[ 1976.574478] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1976.578266] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1976.579819] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19
[ 1976.581276] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1976.582737] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000
[ 1976.584204] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001
[ 1976.585651] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000
12:24:40 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269011099ea715085731fa8ad0600", 0xfffff, r0)

12:24:40 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824004767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:40 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

[ 1976.669865] FAULT_INJECTION: forcing a failure.
[ 1976.669865] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1976.675321] CPU: 1 PID: 10120 Comm: syz-executor.5 Not tainted 5.10.184 #1
[ 1976.676749] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1976.678436] Call Trace:
[ 1976.678982]  dump_stack+0x107/0x167
[ 1976.679268] FAULT_INJECTION: forcing a failure.
[ 1976.679268] name failslab, interval 1, probability 0, space 0, times 0
[ 1976.679731]  should_fail.cold+0x5/0xa
[ 1976.679760]  strncpy_from_user+0x34/0x470
[ 1976.679785]  setxattr+0xc8/0x330
[ 1976.679814]  ? vfs_setxattr+0x270/0x270
[ 1976.685153]  ? _raw_spin_unlock_irq+0x27/0x30
[ 1976.686103]  ? _raw_spin_unlock_irq+0x1f/0x30
[ 1976.687032]  ? mark_held_locks+0x9e/0xe0
[ 1976.687869]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1976.688945]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1976.690048]  ? trace_hardirqs_on+0x5b/0x180
[ 1976.691222]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1976.692534]  ? mnt_want_write_file+0xfd/0x5f0
[ 1976.693597]  ? __mnt_want_write+0x196/0x280
[ 1976.694671]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1976.695729]  do_syscall_64+0x33/0x40
[ 1976.696619]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1976.697878] RIP: 0033:0x7f12f0a7bb19
[ 1976.698784] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1976.703246] RSP: 002b:00007f12edff1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1976.705058] RAX: ffffffffffffffda RBX: 00007f12f0b8ef60 RCX: 00007f12f0a7bb19
[ 1976.706782] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1976.708273] RBP: 00007f12edff11d0 R08: 0000000000000000 R09: 0000000000000000
[ 1976.709738] R10: 000000000000004c R11: 0000000000000246 R12: 0000000000000001
[ 1976.711206] R13: 00007ffc9195868f R14: 00007f12edff1300 R15: 0000000000022000
[ 1976.712855] CPU: 0 PID: 10123 Comm: syz-executor.1 Not tainted 5.10.184 #1
[ 1976.714325] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1976.716053] Call Trace:
[ 1976.716605]  dump_stack+0x107/0x167
[ 1976.717355]  should_fail.cold+0x5/0xa
[ 1976.718162]  ? kvmalloc_node+0x119/0x170
[ 1976.719002]  should_failslab+0x5/0x20
[ 1976.719789]  __kmalloc_node+0x76/0x420
[ 1976.720579]  ? __sanitizer_cov_trace_pc+0x30/0x60
[ 1976.721586]  kvmalloc_node+0x119/0x170
[ 1976.722393]  setxattr+0x14e/0x330
[ 1976.723098]  ? vfs_setxattr+0x270/0x270
[ 1976.723929]  ? lock_acquire+0x1b9/0x470
[ 1976.724755]  ? lock_release+0x680/0x680
[ 1976.725576]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1976.726655]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1976.727759]  ? trace_hardirqs_on+0x5b/0x180
[ 1976.728652]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1976.729766]  ? __mnt_want_write+0x196/0x280
[ 1976.730681]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1976.731586]  do_syscall_64+0x33/0x40
[ 1976.732350]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1976.733402] RIP: 0033:0x7f1be77ddb19
[ 1976.734168] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1976.737926] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1976.739495] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19
[ 1976.740960] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1976.742441] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000
[ 1976.743912] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001
[ 1976.745379] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000
12:24:41 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',noextend,version=9p2000,cachetag=,version=9p2000.L,uname=-@,access=any,uid>', @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:41 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:24:41 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:41 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 4)

12:24:41 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824010767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0600", 0xfffff, r0)

[ 1976.896279] FAULT_INJECTION: forcing a failure.
[ 1976.896279] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 1976.898786] CPU: 1 PID: 10146 Comm: syz-executor.0 Not tainted 5.10.184 #1
[ 1976.900212] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1976.901925] Call Trace:
[ 1976.902483]  dump_stack+0x107/0x167
[ 1976.903227]  should_fail.cold+0x5/0xa
[ 1976.903998]  _copy_from_user+0x2e/0x1b0
[ 1976.904801]  setxattr+0x188/0x330
[ 1976.905487]  ? vfs_setxattr+0x270/0x270
[ 1976.906331]  ? find_held_lock+0x2c/0x110
[ 1976.907166]  ? lock_acquire+0x197/0x470
[ 1976.907968]  ? __x64_sys_fsetxattr+0x176/0x290
[ 1976.908932]  ? lock_release+0x680/0x680
[ 1976.909743]  ? __fget_files+0x296/0x4c0
[ 1976.910568]  ? __mnt_want_write+0x196/0x280
[ 1976.911456]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1976.912367]  do_syscall_64+0x33/0x40
[ 1976.913137]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1976.914208] RIP: 0033:0x7f0e44587b19
[ 1976.914969] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1976.918757] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1976.920320] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19
[ 1976.921804] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1976.923225] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000
[ 1976.924737] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001
[ 1976.926224] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000
12:24:57 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea7150852e1fa8ad0600", 0xfffff, r0)

12:24:57 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{0x8, 0x4, 0xee01}, {}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x6c, 0x2)

12:24:57 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 3)

12:24:57 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0) (fail_nth: 2)

12:24:57 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 5)

12:24:57 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269020f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:57 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:57 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140))
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r1}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:24:57 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad0400", 0xfffff, r0)

[ 1993.314310] FAULT_INJECTION: forcing a failure.
[ 1993.314310] name failslab, interval 1, probability 0, space 0, times 0
[ 1993.318582] CPU: 0 PID: 10159 Comm: syz-executor.1 Not tainted 5.10.184 #1
[ 1993.320014] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1993.321738] Call Trace:
[ 1993.322299]  dump_stack+0x107/0x167
[ 1993.323053]  should_fail.cold+0x5/0xa
[ 1993.323835]  ? create_object.isra.0+0x3a/0xa20
[ 1993.324783]  should_failslab+0x5/0x20
[ 1993.325563]  kmem_cache_alloc+0x5b/0x310
[ 1993.326413]  create_object.isra.0+0x3a/0xa20
[ 1993.327313]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 1993.328356]  __kmalloc_node+0x1ae/0x420
[ 1993.329189]  kvmalloc_node+0x119/0x170
[ 1993.329992]  setxattr+0x14e/0x330
[ 1993.330714]  ? vfs_setxattr+0x270/0x270
[ 1993.331544]  ? mark_held_locks+0x9e/0xe0
[ 1993.332385]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 1993.333460]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1993.334572]  ? trace_hardirqs_on+0x5b/0x180
[ 1993.335465]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 1993.336589]  ? mnt_want_write_file+0xf0/0x5f0
[ 1993.337497]  ? __mnt_want_write+0x196/0x280
[ 1993.338403]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1993.339314]  do_syscall_64+0x33/0x40
[ 1993.340077]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1993.341113] RIP: 0033:0x7f1be77ddb19
[ 1993.341872] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1993.345579] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1993.347177] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19
[ 1993.348629] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1993.350084] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000
[ 1993.351554] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001
[ 1993.353022] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000
[ 1993.354494] FAULT_INJECTION: forcing a failure.
[ 1993.354494] name failslab, interval 1, probability 0, space 0, times 0
[ 1993.357056] CPU: 1 PID: 10169 Comm: syz-executor.5 Not tainted 5.10.184 #1
[ 1993.358529] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1993.360209] Call Trace:
[ 1993.360767]  dump_stack+0x107/0x167
[ 1993.361512]  should_fail.cold+0x5/0xa
[ 1993.362321]  ? kvmalloc_node+0x119/0x170
[ 1993.363145]  should_failslab+0x5/0x20
[ 1993.363919]  __kmalloc_node+0x76/0x420
[ 1993.364719]  kvmalloc_node+0x119/0x170
[ 1993.365512]  setxattr+0x14e/0x330
[ 1993.366214]  ? vfs_setxattr+0x270/0x270
[ 1993.367033]  ? find_held_lock+0x2c/0x110
12:24:57 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

[ 1993.367875]  ? lock_acquire+0x197/0x470
[ 1993.368773]  ? __x64_sys_fsetxattr+0x176/0x290
[ 1993.369709]  ? lock_release+0x680/0x680
[ 1993.370549]  ? __fget_files+0x296/0x4c0
[ 1993.371361]  ? __mnt_want_write+0x196/0x280
[ 1993.372257]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1993.373159]  do_syscall_64+0x33/0x40
[ 1993.373917]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1993.374966] RIP: 0033:0x7f12f0a7bb19
[ 1993.375736] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1993.379446] RSP: 002b:00007f12edff1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1993.380987] RAX: ffffffffffffffda RBX: 00007f12f0b8ef60 RCX: 00007f12f0a7bb19
[ 1993.382443] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1993.383881] RBP: 00007f12edff11d0 R08: 0000000000000000 R09: 0000000000000000
[ 1993.385317] R10: 000000000000004c R11: 0000000000000246 R12: 0000000000000001
[ 1993.386766] R13: 00007ffc9195868f R14: 00007f12edff1300 R15: 0000000000022000
12:24:57 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269030f99ea715085731fa8ad0600", 0xfffff, r0)

12:24:57 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

[ 1993.468242] FAULT_INJECTION: forcing a failure.
[ 1993.468242] name failslab, interval 1, probability 0, space 0, times 0
[ 1993.471984] CPU: 0 PID: 10165 Comm: syz-executor.0 Not tainted 5.10.184 #1
[ 1993.473379] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 1993.475101] Call Trace:
[ 1993.475662]  dump_stack+0x107/0x167
[ 1993.476414]  should_fail.cold+0x5/0xa
[ 1993.477215]  ? posix_acl_alloc+0x20/0xb0
[ 1993.478051]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 1993.479009]  should_failslab+0x5/0x20
[ 1993.479800]  __kmalloc+0x72/0x390
[ 1993.480523]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 1993.481466]  posix_acl_alloc+0x20/0xb0
[ 1993.482290]  posix_acl_from_xattr+0xf5/0x4c0
[ 1993.483208]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 1993.484152]  posix_acl_xattr_set+0x37/0x1b0
[ 1993.485036]  __vfs_setxattr+0x10f/0x180
[ 1993.485857]  ? xattr_resolve_name+0x3e0/0x3e0
[ 1993.486801]  __vfs_setxattr_noperm+0x11a/0x4c0
[ 1993.487744]  __vfs_setxattr_locked+0x1c3/0x250
[ 1993.488689]  vfs_setxattr+0xe8/0x270
[ 1993.489460]  ? __vfs_setxattr_locked+0x250/0x250
[ 1993.490443]  setxattr+0x23d/0x330
[ 1993.491160]  ? vfs_setxattr+0x270/0x270
[ 1993.491982]  ? find_held_lock+0x2c/0x110
[ 1993.492826]  ? lock_acquire+0x197/0x470
[ 1993.493637]  ? __x64_sys_fsetxattr+0x176/0x290
[ 1993.494595]  ? lock_release+0x680/0x680
[ 1993.495419]  ? __fget_files+0x296/0x4c0
[ 1993.496239]  ? __mnt_want_write+0x196/0x280
[ 1993.497131]  __x64_sys_fsetxattr+0x1f9/0x290
[ 1993.498043]  do_syscall_64+0x33/0x40
[ 1993.498815]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 1993.499869] RIP: 0033:0x7f0e44587b19
[ 1993.500630] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 1993.504388] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 1993.505944] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19
[ 1993.507408] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 1993.508852] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000
[ 1993.510330] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001
[ 1993.511781] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000
[ 1993.626366] Process accounting resumed
12:25:10 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 6)

12:25:10 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269040f99ea715085731fa8ad0600", 0xfffff, r0)

12:25:10 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 4)

12:25:10 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad1000", 0xfffff, r0)

12:25:10 executing program 5:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
connect$inet6(0xffffffffffffffff, 0x0, 0x0)
sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x6, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x4c, 0x0) (fail_nth: 3)

12:25:10 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

12:25:10 executing program 3:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
bind$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000240)={@in6={{0xa, 0x0, 0x0, @loopback}}, 0x0, 0x0, 0x3b, 0x0, "105107c93f02f5dac842d1bf018e1d20fe9c45ba840fdeda1d3d07f909e1f8af2a212bb5a9b8c81c1461d600895f29e19e933a66e6f7ed55ab881a00000000000097800e0ebf9118971485f60ed30300"}, 0xd8)
sendfile(0xffffffffffffffff, r0, 0x0, 0x9bbb)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, 0x0, &(0x7f0000000440))
mount$9p_fd(0x0, &(0x7f0000000780)='./file0\x00', &(0x7f00000007c0), 0x2022001, &(0x7f0000000b40)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d85a8e2a0d7b2fb1e446a854af1f8295cd97a0922fda41667e25e8ee3623715aaf3fcf0ee7a1d76945c90cc45f96c248df44b18ab732d1a7f82742bd346c3ce3687bd2a3264caaec2ba32abdb46405ea360f2ba0d27520559e8f6df8c2a", @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYRESDEC=0x0, @ANYBLOB=',seclabel,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',defcontext=unconfined_u,obj_role=system.posix_acl_access\x00,smackfsroot=[-].\r.,smackfshat=(}],subj_role=system.posix_acl_access\x00,fowner=', @ANYRESDEC=0x0, @ANYBLOB=',\x00'])
statx(r0, &(0x7f0000000480)='./file0\x00', 0x100, 0x80, &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f00000005c0)={{{@in6=@loopback, @in=@multicast1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, <r3=>0x0}}, {{@in=@multicast2}, 0x0, @in=@local}}, &(0x7f00000006c0)=0xe8)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r4=>0x0})
sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000280), 0xc, &(0x7f0000000540)={&(0x7f0000000340)={0x1e8, 0x3b, 0x10, 0x70bd25, 0x25dfdbff, {0x1b}, [@nested={0x121, 0x7f, 0x0, 0x1, [@generic="dccd32ac50b3ef0decd101596c2b7affe5d8b4aab9550bebd8b69c7e9591ff5680b9ff4b04cfc7dae09b636613dafa2fc3a046f1489eaedb193b407393ebd7fe125b8c7ce2bd2276ee1ed0c4f6dd5dde8dff444b93e955acc94fc33109abecdc8895a5a6ce143ffb3ab5ad464de67c10a9d0c27682839e7871bd33b3311406721c65c0b6b5acab9950b6cc7f36376d34c88618d776ebead551d72639eaed0791a11015093c509ccf18acbaf11eb9a8165571352991b828cfdb2c78d027c7abe363f6b20896ac922119c0d93ea57800b7c0394537858f25efd0b0b0f7c3c306bb398d59426086a34f708faf", @generic, @typed={0x8, 0x9, 0x0, 0x0, @fd}, @typed={0x8, 0x3b, 0x0, 0x0, @uid=r4}, @generic="f2ba57618d812befee1aaf1c3834fc76fdfeb294ae04be530d3eea12529e839c8ab7"]}, @generic="3e7129f03b598d56b5ba2aa5edd8b00b909c8a31f2b4669efcc8d68938e7a0dcf89422358c423da4c49d527799a31648482e231287ad20896bb6489d98ab949cbe8960854f11e48ac31a28db2dc22c7ff05c9571a1ea5025e5077301e11f9b4aef7d9b07c6b12d97843ec67b0a27861d53f16fec51b8f16a7ee269d8a4a45c78fbce63021a33a2b57dce7700d897b986eb222919332ee2bb02dba25cf26fb04e571f9b7f87513447e6612e292557aa01"]}, 0x1e8}}, 0x4008040)
r5 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x10018, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r5, 0x40086602, &(0x7f0000000040)=0x100000)
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r6=>0x0, <r7=>0x0})
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {r6, r7}}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3, r2}, {0x2, 0x7, r3}, {0x2, 0x5, r4}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2, r7}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x7c, 0x2)

12:25:10 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{}, {0x8, 0x1}], {0x10, 0x3}, {0x20, 0x2}}, 0x64, 0x2)

12:25:10 executing program 4:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {}, {}], {}, [{}, {0x8, 0x1}], {}, {0x20, 0x2}}, 0x64, 0x2)

12:25:10 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269100f99ea715085731fa8ad0600", 0xfffff, r0)

[ 2006.304338] FAULT_INJECTION: forcing a failure.
[ 2006.304338] name failslab, interval 1, probability 0, space 0, times 0
[ 2006.305683] CPU: 1 PID: 10192 Comm: syz-executor.5 Not tainted 5.10.184 #1
[ 2006.306429] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.307348] Call Trace:
[ 2006.307637]  dump_stack+0x107/0x167
[ 2006.308027]  should_fail.cold+0x5/0xa
[ 2006.308446]  ? create_object.isra.0+0x3a/0xa20
[ 2006.308938]  should_failslab+0x5/0x20
[ 2006.309368]  kmem_cache_alloc+0x5b/0x310
[ 2006.309815]  ? lock_downgrade+0x6d0/0x6d0
[ 2006.310268]  create_object.isra.0+0x3a/0xa20
[ 2006.310756]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 2006.311313]  __kmalloc_node+0x1ae/0x420
[ 2006.311751]  kvmalloc_node+0x119/0x170
[ 2006.312174]  setxattr+0x14e/0x330
[ 2006.312546]  ? vfs_setxattr+0x270/0x270
[ 2006.312983]  ? find_held_lock+0x2c/0x110
[ 2006.313423]  ? lock_acquire+0x197/0x470
[ 2006.313847]  ? __x64_sys_fsetxattr+0x176/0x290
[ 2006.314347]  ? lock_release+0x680/0x680
[ 2006.314785]  ? __fget_files+0x296/0x4c0
[ 2006.315222]  ? __mnt_want_write+0x196/0x280
[ 2006.315691]  __x64_sys_fsetxattr+0x1f9/0x290
[ 2006.316179]  do_syscall_64+0x33/0x40
[ 2006.316594]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 2006.317167] RIP: 0033:0x7f12f0a7bb19
[ 2006.317584] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2006.319632] RSP: 002b:00007f12edff1188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 2006.320481] RAX: ffffffffffffffda RBX: 00007f12f0b8ef60 RCX: 00007f12f0a7bb19
[ 2006.321276] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 2006.322073] RBP: 00007f12edff11d0 R08: 0000000000000000 R09: 0000000000000000
[ 2006.322877] R10: 000000000000004c R11: 0000000000000246 R12: 0000000000000001
[ 2006.323681] R13: 00007ffc9195868f R14: 00007f12edff1300 R15: 0000000000022000
[ 2006.333667] FAULT_INJECTION: forcing a failure.
[ 2006.333667] name failslab, interval 1, probability 0, space 0, times 0
[ 2006.334902] CPU: 1 PID: 10203 Comm: syz-executor.0 Not tainted 5.10.184 #1
[ 2006.335646] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.336546] Call Trace:
[ 2006.336832]  dump_stack+0x107/0x167
[ 2006.337227]  should_fail.cold+0x5/0xa
[ 2006.337642]  ? create_object.isra.0+0x3a/0xa20
[ 2006.338145]  should_failslab+0x5/0x20
[ 2006.338566]  kmem_cache_alloc+0x5b/0x310
[ 2006.339011]  ? avc_has_perm+0xc5/0x1b0
[ 2006.339430]  create_object.isra.0+0x3a/0xa20
[ 2006.339915]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 2006.340464]  __kmalloc+0x16e/0x390
[ 2006.340862]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 2006.341355]  posix_acl_alloc+0x20/0xb0
[ 2006.341778]  posix_acl_from_xattr+0xf5/0x4c0
[ 2006.342261]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 2006.342787]  posix_acl_xattr_set+0x37/0x1b0
[ 2006.343276]  __vfs_setxattr+0x10f/0x180
[ 2006.343724]  ? xattr_resolve_name+0x3e0/0x3e0
[ 2006.344232]  __vfs_setxattr_noperm+0x11a/0x4c0
[ 2006.344742]  __vfs_setxattr_locked+0x1c3/0x250
[ 2006.345254]  vfs_setxattr+0xe8/0x270
[ 2006.345671]  ? __vfs_setxattr_locked+0x250/0x250
[ 2006.346213]  setxattr+0x23d/0x330
[ 2006.346607]  ? vfs_setxattr+0x270/0x270
[ 2006.347043]  ? find_held_lock+0x2c/0x110
[ 2006.347505]  ? lock_acquire+0x197/0x470
[ 2006.347941]  ? __x64_sys_fsetxattr+0x176/0x290
[ 2006.348448]  ? lock_release+0x680/0x680
[ 2006.348894]  ? __fget_files+0x296/0x4c0
[ 2006.349339]  ? __mnt_want_write+0x196/0x280
[ 2006.349824]  __x64_sys_fsetxattr+0x1f9/0x290
[ 2006.350316]  do_syscall_64+0x33/0x40
[ 2006.350748]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 2006.351317] RIP: 0033:0x7f0e44587b19
[ 2006.351728] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2006.353774] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 2006.354631] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19
[ 2006.355428] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 2006.356229] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000
[ 2006.357014] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001
[ 2006.357807] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000
[ 2006.363484] FAULT_INJECTION: forcing a failure.
[ 2006.363484] name fail_usercopy, interval 1, probability 0, space 0, times 0
[ 2006.364822] CPU: 1 PID: 10201 Comm: syz-executor.1 Not tainted 5.10.184 #1
[ 2006.365579] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.366498] Call Trace:
[ 2006.366792]  dump_stack+0x107/0x167
[ 2006.367198]  should_fail.cold+0x5/0xa
12:25:10 executing program 2:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
mlock2(&(0x7f0000fff000/0x1000)=nil, 0x1000, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(r0, &(0x7f0000000100)='./file0\x00', 0x2000, 0x7ff, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, <r1=>0x0})
stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, <r2=>0x0})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2, r1}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x7, 0xee00}, {0x2, 0x2}, {0x2, 0x3}, {0x2, 0x7}, {0x2, 0x5, r2}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {0x10, 0x3}, {0x20, 0x2}}, 0x74, 0x2)

[ 2006.367631]  _copy_from_user+0x2e/0x1b0
[ 2006.368266]  setxattr+0x188/0x330
[ 2006.368637]  ? vfs_setxattr+0x270/0x270
[ 2006.369060]  ? find_held_lock+0x2c/0x110
[ 2006.369499]  ? lock_acquire+0x197/0x470
[ 2006.369924]  ? __x64_sys_fsetxattr+0x176/0x290
[ 2006.370412]  ? lock_release+0x680/0x680
[ 2006.370857]  ? __fget_files+0x296/0x4c0
[ 2006.371304]  ? __mnt_want_write+0x196/0x280
[ 2006.371787]  __x64_sys_fsetxattr+0x1f9/0x290
[ 2006.372275]  do_syscall_64+0x33/0x40
[ 2006.372692]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 2006.373258] RIP: 0033:0x7f1be77ddb19
[ 2006.373672] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2006.375711] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 2006.376550] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19
[ 2006.377337] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 2006.378126] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000
[ 2006.378923] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001
[ 2006.379708] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000
12:25:10 executing program 1:
mbind(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, 0x0)
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
statx(0xffffffffffffffff, 0x0, 0x2000, 0x0, 0x0)
stat(0x0, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0)
ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040))
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {0x2, 0x2, 0xee01}, {0x2, 0x0, 0xee00}, {0x2, 0x2}, {}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}, {0x8, 0x1}], {0x10, 0x3}}, 0x7c, 0x2) (fail_nth: 5)

12:25:10 executing program 6:
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269010f99ea715085731fa8ad1400", 0xfffff, r0)

12:25:10 executing program 0:
r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0)
setsockopt$inet6_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, 0x0, 0x0)
getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000340)={{{@in6=@private0, @in6=@remote}}, {{@in6=@mcast2}, 0x0, @in=@broadcast}}, 0x0)
mount$9p_fd(0x0, 0x0, &(0x7f00000007c0), 0x2022001, 0x0)
r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0)
ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000140)={{0x1, 0x1, 0x18, r1}, './file0\x00'})
fsetxattr$system_posix_acl(r0, &(0x7f0000000040)='system.posix_acl_access\x00', &(0x7f0000000700)={{}, {0x1, 0x4}, [{0x2, 0x2}, {0x2, 0x6, 0xee01}, {}, {0x2, 0x3}, {0x2, 0x7}, {}], {}, [{0x8, 0x4, 0xee01}, {0x8, 0x2}], {}, {0x20, 0x2}}, 0x64, 0x2) (fail_nth: 7)

12:25:10 executing program 7:
openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0)
stat(0x0, 0x0)
setresuid(0xffffffffffffffff, 0x0, 0x0)
r0 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd)
add_key(&(0x7f00000000c0)='dns_resolver\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000340)="a407c3efc1edfab7037255db440500824001767ee5522ccc6b4a4c358e2f414cae835269011099ea715085731fa8ad0600", 0xfffff, r0)

[ 2006.500663] FAULT_INJECTION: forcing a failure.
[ 2006.500663] name failslab, interval 1, probability 0, space 0, times 0
[ 2006.501917] CPU: 1 PID: 10216 Comm: syz-executor.0 Not tainted 5.10.184 #1
[ 2006.502662] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.503548] Call Trace:
[ 2006.503841]  dump_stack+0x107/0x167
[ 2006.504234]  should_fail.cold+0x5/0xa
[ 2006.504647]  ? jbd2__journal_start+0x190/0x7e0
[ 2006.505144]  should_failslab+0x5/0x20
[ 2006.505557]  kmem_cache_alloc+0x5b/0x310
[ 2006.505993]  ? _down_write_nest_lock+0x160/0x160
[ 2006.506514]  jbd2__journal_start+0x190/0x7e0
[ 2006.506991]  __ext4_journal_start_sb+0x214/0x390
[ 2006.507501]  ext4_set_acl+0x22a/0x590
[ 2006.507913]  ? ext4_get_acl+0x650/0x650
[ 2006.508341]  ? from_kuid_munged+0x130/0x130
[ 2006.508805]  ? __kasan_kmalloc.constprop.0+0xc9/0xd0
[ 2006.509346]  ? __sanitizer_cov_trace_switch+0x45/0x80
[ 2006.509896]  ? posix_acl_valid+0x204/0x330
[ 2006.510351]  set_posix_acl+0x226/0x2d0
[ 2006.510795]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 2006.511306]  posix_acl_xattr_set+0x8e/0x1b0
[ 2006.511784]  __vfs_setxattr+0x10f/0x180
[ 2006.512229]  ? xattr_resolve_name+0x3e0/0x3e0
[ 2006.512735]  __vfs_setxattr_noperm+0x11a/0x4c0
[ 2006.513246]  __vfs_setxattr_locked+0x1c3/0x250
[ 2006.513769]  vfs_setxattr+0xe8/0x270
[ 2006.514185]  ? __vfs_setxattr_locked+0x250/0x250
[ 2006.514739]  setxattr+0x23d/0x330
[ 2006.515125]  ? vfs_setxattr+0x270/0x270
[ 2006.515568]  ? find_held_lock+0x2c/0x110
[ 2006.516026]  ? lock_acquire+0x197/0x470
[ 2006.516474]  ? __x64_sys_fsetxattr+0x176/0x290
[ 2006.516981]  ? lock_release+0x680/0x680
[ 2006.517450]  ? __fget_files+0x296/0x4c0
[ 2006.517901]  ? __mnt_want_write+0x196/0x280
[ 2006.518398]  __x64_sys_fsetxattr+0x1f9/0x290
[ 2006.518900]  do_syscall_64+0x33/0x40
[ 2006.519317]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 2006.519886] RIP: 0033:0x7f0e44587b19
[ 2006.520301] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2006.522336] RSP: 002b:00007f0e41afd188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 2006.523201] RAX: ffffffffffffffda RBX: 00007f0e4469af60 RCX: 00007f0e44587b19
[ 2006.523992] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 2006.524779] RBP: 00007f0e41afd1d0 R08: 0000000000000002 R09: 0000000000000000
[ 2006.525571] R10: 0000000000000064 R11: 0000000000000246 R12: 0000000000000001
[ 2006.526366] R13: 00007ffc3f99659f R14: 00007f0e41afd300 R15: 0000000000022000
[ 2006.622546] FAULT_INJECTION: forcing a failure.
[ 2006.622546] name failslab, interval 1, probability 0, space 0, times 0
[ 2006.625421] CPU: 0 PID: 10217 Comm: syz-executor.1 Not tainted 5.10.184 #1
[ 2006.626997] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014
[ 2006.628811] Call Trace:
[ 2006.629395]  dump_stack+0x107/0x167
[ 2006.630215]  should_fail.cold+0x5/0xa
[ 2006.631050]  ? posix_acl_alloc+0x20/0xb0
[ 2006.631953]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 2006.632977]  should_failslab+0x5/0x20
[ 2006.633818]  __kmalloc+0x72/0x390
[ 2006.634587]  ? _raw_spin_unlock_irq+0x27/0x30
[ 2006.635578]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 2006.636583]  posix_acl_alloc+0x20/0xb0
[ 2006.637426]  posix_acl_from_xattr+0xf5/0x4c0
[ 2006.638385]  ? posix_acl_from_xattr+0x4c0/0x4c0
[ 2006.639406]  posix_acl_xattr_set+0x37/0x1b0
[ 2006.640345]  __vfs_setxattr+0x10f/0x180
[ 2006.641210]  ? xattr_resolve_name+0x3e0/0x3e0
[ 2006.642200]  __vfs_setxattr_noperm+0x11a/0x4c0
[ 2006.643207]  __vfs_setxattr_locked+0x1c3/0x250
[ 2006.644205]  vfs_setxattr+0xe8/0x270
[ 2006.645020]  ? __vfs_setxattr_locked+0x250/0x250
[ 2006.646061]  setxattr+0x23d/0x330
[ 2006.646832]  ? vfs_setxattr+0x270/0x270
[ 2006.647717]  ? lockdep_hardirqs_on_prepare+0x277/0x3e0
[ 2006.648873]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 2006.650044]  ? trace_hardirqs_on+0x5b/0x180
[ 2006.650998]  ? asm_sysvec_apic_timer_interrupt+0x12/0x20
[ 2006.652188]  ? __mnt_want_write+0x12/0x280
[ 2006.653106]  ? __mnt_want_write+0x40/0x280
[ 2006.654024]  ? __mnt_want_write+0x196/0x280
[ 2006.654978]  __x64_sys_fsetxattr+0x1f9/0x290
[ 2006.655937]  do_syscall_64+0x33/0x40
[ 2006.656760]  entry_SYSCALL_64_after_hwframe+0x61/0xc6
[ 2006.657869] RIP: 0033:0x7f1be77ddb19
[ 2006.658701] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48
[ 2006.662698] RSP: 002b:00007f1be4d53188 EFLAGS: 00000246 ORIG_RAX: 00000000000000be
[ 2006.664382] RAX: ffffffffffffffda RBX: 00007f1be78f0f60 RCX: 00007f1be77ddb19
[ 2006.665939] RDX: 0000000020000700 RSI: 0000000020000040 RDI: 0000000000000003
[ 2006.667526] RBP: 00007f1be4d531d0 R08: 0000000000000002 R09: 0000000000000000
[ 2006.669103] R10: 000000000000007c R11: 0000000000000246 R12: 0000000000000001
[ 2006.670783] R13: 00007ffea2f7189f R14: 00007f1be4d53300 R15: 0000000000022000
BUG: leak checking failed

VM DIAGNOSIS:
12:25:10  Registers:
info registers vcpu 0
RAX=ffffffff814cb29e RBX=dffffc0000000000 RCX=ffffffff8141848f RDX=0000000000000000
RSI=ffffffff814c776e RDI=ffffffff84bd8248 RBP=ffff888049eefcd0 RSP=ffff888049eefc08
R8 =0000000000000001 R9 =0000000000000001 R10=000000007fff0000 R11=0000000000000001
R12=000000000000005d R13=ffffed10093ddf9c R14=ffff888049eefce0 R15=ffffc900006c3060
RIP=ffffffff814cb29e RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS   [-WA]
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f2bcfbe78c0 00000000 00000000
GS =0000 ffff88806ce00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000001000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=000056270e92e3f8 CR3=000000005c304000 CR4=00350ef0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f
XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=696e656420737365636341002f737973
XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=000056270e903a70000056270e0c50d0
XMM06=000056270e9450600000000000000000 XMM07=00000000000000000000000000000000
XMM08=610064253a64252f6b636f6c622f7665 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000
info registers vcpu 1
RAX=dffffc0000000000 RBX=0000000000000040 RCX=ffffffff815fec09 RDX=ffff88804acbb480
RSI=ffffffff815ff5ef RDI=0000000000000005 RBP=ffff888054e1dd00 RSP=ffff88804e0a7d70
R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000000 R11=0000000000000001
R12=000056270e908d98 R13=ffff888054e1dd40 R14=ffff888054e1dd50 R15=ffff88804acbb480
RIP=ffffffff815ff602 RFL=00000293 [--S-A-C] CPL=0 II=0 A20=1 SMM=0 HLT=0
ES =0000 0000000000000000 00000000 00000000
CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA]
SS =0000 0000000000000000 00000000 00000000
DS =0000 0000000000000000 00000000 00000000
FS =0000 00007f2bcfbe78c0 00000000 00000000
GS =0000 ffff88806cf00000 00000000 00000000
LDT=0000 fffffe0000000000 00000000 00000000
TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy
GDT=     fffffe0000048000 0000007f
IDT=     fffffe0000000000 00000fff
CR0=80050033 CR2=000056270e908d98 CR3=0000000049c4c000 CR4=00350ee0
DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 
DR6=00000000ffff0ff0 DR7=0000000000000400
EFER=0000000000000d01
FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80
FPR0=0000000000000000 0000 FPR1=0000000000000000 0000
FPR2=0000000000000000 0000 FPR3=0000000000000000 0000
FPR4=0000000000000000 0000 FPR5=0000000000000000 0000
FPR6=0000000000000000 0000 FPR7=0000000000000000 0000
XMM00=00000000000000000000000000000000 XMM01=ffff00ffffff00000000000000000000
XMM02=ffffff0f0e0d0c0b0a09080706050403 XMM03=696e656420737365636341002f737973
XMM04=00000001ffffffff000056270e943a60 XMM05=00000000000000000000000000000000
XMM06=000056270e93bb100000000200000004 XMM07=00000000000000000000000000000000
XMM08=2064616572206f742064656c69614600 XMM09=00000000000000000000000000000000
XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000
XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000
XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000