0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000000)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_unix(&(0x7f00000001c0)='./file0\x00', &(0x7f0000000340)='./file0\x00', &(0x7f0000000380), 0x50, &(0x7f0000000240)=ANY=[]) read(r0, &(0x7f0000000140)=""/102, 0x66) 03:13:48 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000040), 0x12000, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) fcntl$getown(r0, 0x9) syz_mount_image$vfat(&(0x7f0000001740), &(0x7f0000001780)='./file0\x00', 0x0, 0x0, &(0x7f00000027c0), 0x0, &(0x7f0000002800)={[{@fat=@check_strict}, {@fat=@discard}]}) 03:13:48 executing program 4: r0 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101000, 0x94) ioctl$FITHAW(r0, 0xc0045878) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x7ddd}, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, &(0x7f000000a580)={0x0, 0x0, &(0x7f000000a540)={&(0x7f0000001700)={{0x14}, [], {0x14}}, 0x28}}, 0x0) 03:13:48 executing program 5: r0 = fork() ptrace(0xffffffffffffffff, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) [ 416.267313] netlink: 140 bytes leftover after parsing attributes in process `syz-executor.0'. [ 416.274796] 9pnet_virtio: no channels available for device ./file0 [ 416.279127] FAT-fs (loop2): bogus number of reserved sectors [ 416.280478] FAT-fs (loop2): Can't find a valid FAT filesystem 03:13:48 executing program 0: r0 = fsmount(0xffffffffffffffff, 0x0, 0x74) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f00000001c0)=0x40, 0x4) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0xfffffffffffffe6d, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000240)='./file0/../file0\x00', &(0x7f0000000140)='./file0/../file0\x00', 0x0, 0x1f3000, 0x0) mount$bind(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000180), 0x400, 0x0) syz_mount_image$ext4(&(0x7f00000000c0)='ext2\x00', &(0x7f0000000280)='./file0/../file0\x00', 0xfffffffffffffffd, 0x0, 0x0, 0x8880b2, &(0x7f0000000080)=ANY=[@ANYRES64]) 03:13:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = creat(&(0x7f00000001c0)='./file0\x00', 0x0) getsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x20, &(0x7f00000012c0)={@multicast1, @multicast1}, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) setsockopt$IPT_SO_SET_ADD_COUNTERS(r1, 0x0, 0x41, &(0x7f00000000c0)={'mangle\x00', 0x5, [{}, {}, {}, {}, {}]}, 0x78) flock(0xffffffffffffffff, 0x0) openat(0xffffffffffffffff, 0x0, 0x101800, 0x0) listxattr(&(0x7f0000000080)='./file0\x00', 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001580)=ANY=[], 0x14}}, 0x0) read(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x2, 0x0, 0x0, 0xfffffffc, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(r1, r0) [ 416.461049] EXT4-fs (sda): Unrecognized mount option "ÿÿÿÿÿÿÿÿ" or missing value 03:14:01 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x10002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_msfilter(0xffffffffffffffff, 0x0, 0x29, &(0x7f0000000180)={@empty, @loopback, 0x0, 0x1, [@empty]}, 0x14) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802000001000001010053500701beef005252050181505824016d4100000000416d03000000000000030000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a0843451c0119000000000000190000000000000000ed000000000000ed6600170000000000001700080000000008007809140b2a3a080200000100000101015252050181505824016d4100000000416d02000000000000020000000000000000000000000000000054461a010e7809140b2a3a087809140b2a3a087809140b2a3a08008c001a0000000000", 0xf6, 0xb800}], 0x0, &(0x7f0000011700)=ANY=[@ANYBLOB="01"]) readv(0xffffffffffffffff, &(0x7f0000001840)=[{0x0}, {&(0x7f0000000480)=""/150, 0x96}, {&(0x7f0000000140)=""/31, 0x1f}, {&(0x7f0000000540)=""/118, 0x76}, {&(0x7f00000005c0)=""/252, 0xfc}, {0x0}, {&(0x7f0000000740)=""/222, 0xde}, {&(0x7f0000000840)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/21, 0x15}], 0x9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000280)=ANY=[@ANYBLOB, @ANYRES32, @ANYBLOB="f7"]) r0 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001d80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(r0, &(0x7f0000001dc0)='system_u:object_r:fonts_t:s0\x00', 0x1d) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='gid_map\x00') writev(r1, &(0x7f0000000200)=[{&(0x7f0000000040)='3', 0x1}], 0x1) setsockopt$inet_group_source_req(r1, 0x0, 0x2e, &(0x7f00000002c0)={0x4, {{0x2, 0x4e21, @local}}, {{0x2, 0x4e20, @private}}}, 0x108) r2 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000001d80)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f0000001900)='system_u:object_r:hald_cache_t:s0\x00', 0x22) pwrite64(0xffffffffffffffff, &(0x7f00000001c0)='X', 0x1, 0x0) fchown(0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$selinux_attr(0xffffffffffffffff, &(0x7f00000000c0)='system_u:object_r:hald_log_t:s0\x00', 0x20) ioctl$F2FS_IOC_RELEASE_VOLATILE_WRITE(r2, 0xf504, 0x0) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000000080)={0xa, 0x4e20, 0x2, @remote, 0x7f}, 0x1c, &(0x7f0000000700)=[{&(0x7f0000000400)="25491a8362bca08589bfa78614ae41e894e507e02d9d1eef35913b8c25dfe30c9ea4331f3cf0a8136764ca84831c55992f4d418efad0cb400b466ab47a2fed40204a51ae62832b30b226020f14ac07ec03c780c4d11d763e713ffe2fe434edcde9", 0x61}, {&(0x7f00000006c0)="69fb6410ba00bedc763cb4c02ec9bd356db1ddd7fa", 0x15}], 0x2}, 0x8040021) 03:14:01 executing program 6: openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x501, 0x0) syz_genetlink_get_family_id$SEG6(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5f, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000040), 0x0, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000080)={'\x00', 0x0, 0x408, 0x7}) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$SG_GET_COMMAND_Q(0xffffffffffffffff, 0x2270, &(0x7f00000011c0)) readv(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) ioctl$BLKTRACESTART(0xffffffffffffffff, 0x1274, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f0000000140)) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000001200), 0x10000, 0x0) getsockopt$inet6_mreq(r1, 0x29, 0x15, &(0x7f00000058c0)={@local}, &(0x7f0000005900)=0x14) openat(0xffffffffffffffff, &(0x7f0000001140)='./file0\x00', 0x140c0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80, 0x20) 03:14:01 executing program 7: r0 = shmget$private(0x0, 0x1000, 0x1854, &(0x7f0000ffc000/0x1000)=nil) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffa000/0x3000)=nil) shmat(r1, &(0x7f0000ff9000/0x4000)=nil, 0x4000) shmctl$SHM_LOCK(r1, 0xb) shmctl$SHM_LOCK(r0, 0xb) shmctl$SHM_UNLOCK(r1, 0xc) shmat(r1, &(0x7f0000ffe000/0x1000)=nil, 0x4000) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) clone3(&(0x7f0000000140)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe(&(0x7f00000003c0)={0xffffffffffffffff, 0xffffffffffffffff}) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="7472616e733d66642c7266646e6f3d5f0943666ef1fb26212e30dde66cdfe6687a3a32b94cd040e4b31efaeed8b729b8bb308350979a4656581def7021883c4b03e56a54ac11db520f3f2d2cd0eeaaafa089c8c948cdba2c272265d0bbd2090000004df97a2a", @ANYRESHEX=r2, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',mmap,\x00']) 03:14:01 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) r2 = openat$sr(0xffffffffffffff9c, &(0x7f0000000100), 0x8481, 0x0) syz_open_pts(r2, 0x484803) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$TIOCSCTTY(r0, 0x540e, 0x100) sendfile(r0, r1, &(0x7f0000000000)=0x1, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) mount$9p_fd(0x0, &(0x7f0000000040)='./cgroup.net/cgroup.procs\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="3d11ead6c0e6c311c06cbd384a8ac804e69dafc9f920a1d639fdeae5774289625c941204a9853f745587c1d43c55af366def23ef5cd3b174c3694044c61a276443eba5fcb176b1f06fee0ea9be2bb3fc73fff9a8ac0c1b1ac785952406191f566fbd66b91507b95d08ad0a026ee878825247fb3a9605c7cf9c1fbdf6a280cd0270a6978677ec20ee66016e2e33055bd95b729237f6f6e2513aaf05406fc6e363751d5300776000b17551698a55079c9a23e522d6d9a063a123646a8820ff5eb3dac4f2000cca69a3b484", @ANYRESHEX=r0, @ANYBLOB=',wfdno=', @ANYRESHEX=r3, @ANYBLOB=',\x00']) 03:14:01 executing program 5: r0 = fork() ptrace(0xffffffffffffffff, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:14:01 executing program 1: pipe2(0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000014c0)={'HL\x00'}, &(0x7f0000001540)=0x1e) pipe2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000001340)=""/77, 0xffffffffffffff51) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001e00)=ANY=[@ANYBLOB="481200001000010000000000000000000000000005000000120000002b124680024139384e9b3e77be6f30aa83acee5be2a47a75ef002d4296f04f08e3e57bc8e35f52bda75bc8fc1b5bc8fc62772c61da0bce7269f6b2e8e744b0460300f2ff9e18d420c0d9b8eb97ee7acc0a771e503ca72fe7cc8e85abb3ea278571cb6b2d6c06c084cd0cbd3d3efa116d0f10a36cb113565c54f925a5780c0de7eb1bd8d03f2b985c19672bac5851ec50dbc45f6c818082331d8ad63c5a2972b674c9e042c31c4ce015c2bd14d3a6e61f5206a001a887a0e16d0d38b0372176a64cab6f77f2b3fddd0410c08b793a1c0896463d2982ba9dde8dc20f0c842eb82a9f8fc0ec77e37bf0e73f7c461f1a638ec25ec72b2aa0de58a1225fdd4b7cd63e4ce054df41d01d06107c1695a500615b7a87bdff2c4ff2aabb3528eecdde2d805c423b626091b68cebdd463036cb47d7979207c0249f81ef7f32d5cbd0c461ae1ad2323a86e82251c8b019d98cb9ea8f2a15f64d69c5c02616592ee19d94c0f392d08b3f02cbef691069d1bf1460f8e3a2adbdcafcc5fcffa239b741967ad7821bcdc178c942d9ec68858025eadeb95c1d0a7b436403da759e04b79252fc99808c830a7b000400ee13ffeea086e5c910cdc9f98971e53b2e0585b76ea7b2f8ae52177f87124822d7689ca8902f2d2ed8b3c73cf15116307ddca830bda251c8365ed31de015afe2c799e47fefbd7428acc43ddcb3b3972791731b801970a51b9c823128dd6e51cfc3061d5131a9335cec4de35b13781ce73e02838aea8ef5000a007b00212c21255e000000919b03c6e599a57f81a077f41934e53fab74b00f4b0ffbe8b7dcd1e5bfbc0a9d12ce8e3aa71eca211e8faecb4e0ccf8fc4d7c736ce1e1dd92260470aff8c7c4cbf6928bff953dd365b53df396873f07200d8cb62e55aa6cd0822ea076d96cb97ca3ed02521d99e624e29fdcba465718213430b48db741e3600c0b2953dcf9c74aa8e523678c986044b852947fb43068768a16e6d31ab3dc31e2c6cdba1d890d6ae6eb0a9979ad2a16851578fe0250296e246012f6559960a46c4f366f81310e7b7500d2267263ae6d89d6b8a5a6a7dd30272e171f4c5855c4e0d9588ccf517b186c8054a5310eb1886030caab803d7d5b052fc88a7fa216dc3dc3d7661d9775f363cc19fd587f11829975c3685e8c4978e4ec8a948daba670683e2b02d67cf23b669e3e0b9cebce9439a804c5bafbc38dfa9bedd428a0445ea02ef0189f567988bdf328f323196631f9bf1d6a917609d0d99211457e8ceaa41d2722f7610a3d73f8e5d7615cf822c3fd38e187373564f64d7fc0d641ceb0b725fcd6a7db8bbced60d69b1c0278105221b9883d46868f98d12baff8ec9b5d7df0fe596c97cc6fbcb9ca8f10a1f26473b0d3f6cca425e769fbf3b7aa2200cb7dd9656dc474eccb48f909819aeec6cdf2d1d2c900f88423d158f04d55e58775116557a14bb180dce9b38d1b48ed4da353f16a77a08bcb28cda338c432707c4833f1776282ad1747cf14dd52db08568733c86e35ac89283aabc2389a4fbe9000dff6799e0c07076ba9034c4c8a0ca2fcf2a3b3ff341543468bcb61b1780ca0b0acbb81d5ce821ef17531711d6165bf2d10124adac46379a058726ec0c2e49c515f7f36e7323ce36f138115f07adfc684f4bb8c78b635b4f4e4cef9ea98511b8390810b94dd47e10681df211a32c2e3d0a9b202a1b774c477fa59d4337cfde01a4666a25980f51b52763b5d2b4526cff112abe484d0ab9eec6d396ff8d4cb1ec2f692514ad0295d929b46fe55d5341835be0da62fb42b8d0e0f89bd9738dcc236c9fe0b26a60acfdedcc68c67c9ee45dc2d6409d7557c19f756f0aa50360cc97f961abf14953989360fa8adc23def9a82cd496a7574e2c6856c2f27c3a87478faf3830ecdb6ed9793afbc945f1ca36cfd9ab6bf2f44a3e44792d71a6b98d26277edcc0c30ce85906bb31c2016f286be2920dd862d65fbff7a06a4f9fb9d138c8b6ae3e9a0f86be97d04149c6c2931f61eeac5429f45be765c54001bba8e268636ed22d69f4f3327f06b82fd0577841fbfbd3885c14fd91b7f012dcd0532e3173270c8a21b311dfe5d35fd82d7569654220405740cfaf70eec3c185c9299c201641e49dedbe5eae912d55310d155dcede2c03f73d882058e53e00b17d4a793e4df5baae45dfb4fe86a7ed614c9a9a0fd24687386387d2c8a58a008767544554bc3cd1bcd767f11ebd6a1217fbb0228713d306a117bc8bb10f322036047e44eab085c22b73eea61ae0f8e65a0c2b27f326bdcc65c0fc64b0178fcaff9fa34a4287e52e2580ad0c580cdfb1fe26358d685b6695843bccc99be5e0eebd062876ecef22a984008da8d43be8ee3f7d503e3aac053c929963a1096853f3cbeec1ab942d61564635ea64d2a1f5fa05c95c7212378ea91221ab49279b3cbdd4475022834cc6b4f1e54536eda80a0724b3e7ae2103754cba3768ebace46dfa4ce45bbf2e7a3a13aecb639de66127d4218d7726046f61f9ab28511aaefcde1df3db93261507e63dbc45110631c003301155aa78b748e816e4cabc2cfb7e2c4430991c789bb338b0add073d888ef0940d23bb9c04565e7fa1a09e121dfe5910111a547610fb67cf81a4e195164dac3a2059357c0c84691602526b6a677fbd893c0ce99f84b5fc59d7fcf20a8619ee3f7907c3d88a7055e26cc9ad76faccd7cea570286012561bd1187cd8e655cfce06acbe1e4221f18c3b950db4eb9112afedb6a7a0497cee9e436286d073d1b43641d39bcb9f87a6dd8cc483a8028a94bcf67a0be57829a91144f6d1e0a044fe3ccfebf436fbc05155a9f17c745052e8e135aa7dd842077d7b2b4e6c9bd26827d26b6c00e787b211d278f3da2274a03aba22890c96fdf8a72428f62a01b8499b4b50dee4b53d52111db6f9ad143a3be21d3df016583dcecdf55733798dc9b12cfdd0471a60282bbbcf390f07c80e3c74bb18e0afcd8d9d7864984e8d9678fb30d3ac30e2602153f3cb97436a36f7137a2db751f4f0d960dbd0040a604dbb42d1ee83ae05a69a9ca91e7fe0106a2e84dec9e6a5ee4c29145e3d71afd348bf62d17df94e607250d14f9685e28435940748e1c166e4a26cfd3a5dbee2d3f82699a091159e796a2f8be8bb54af625d2b854aa0e64bcdd06fb80609cfd4df646d83488fdce8dd54cbfde0026988b39e8a5ea2fd18a05e8ba5cab27bfdea0a4701941167c52d8f71cbecc7d13444e4a6bc68fd671f1a482ba0da882736dc42707faecf9a5a7f1ec3c8117191b54b00ee94320d67289553e6dd721e8c5cc54df07304cc928f792e814a4df622b0faaa08388807fc92ae9cd6530fdf5cfa25c541a6645ee20d21b8222dc493880f5ad3af3158c912b2e9ea24c171d267976ba48aaa0323ad3edcacac8c4dff6d3e50a6331d732596219d3fcd2055d034294ce74df2ad8562c71a618a507f72cdef124df556bdbbf18f0392d6934c391f183ad4195bd1b383022aac60aee1564060015e3e6f965739dd127818eed578329341917cd345638a29fe0fa66ad00de8669972565f2a5b17355d013d672219b11ad66199f44a1cb9a9d6cea0ada746fe010baee5d81433ff2e7cddc8feba8b1b33cb25587860af3f4aaad5d7a347a804fbba74450b046bb604566486ed6132b688973ba123926ecd431ccc4fb72ed7b87dc9499e435be5f23d0d517098c7c911712d968c60605a63689396248864e24850d44839e1e11e716b09b8b62ad4f8bc7e295c8be8dca419f1979f1776d29f9961347fdeb68c2051ad4524da6b5a434690b7de6ff43a6105ed4bfd57e8ec1519432114e57a67689e5376d7ef17c8e40b0c7cb8c6f0979168227173b43a9717d0528261cb2cc60f6ae5071b75d18ac16a5ad05f09713184dad7d2b902a597e3e822a3bbb001a20f5a30183a28bab90d8f9849d231b93098545595df520ea6b8afa3af0bf5a14d2bee109e792b9dd7f505e0d4f3c58f88a5498d97d6fd54d775efcaa61840edb311958b087b359fa94177e9cb1ee1c85394389ee1ab2084cd639c4f3c25b5ffd69f877da198720a79aad5a278104b3264c3bb2fbc8f1d6d6098fd6655d442f56dd7797da0bf36ff109c1924a344c7d8b17b78f089cd70d79c66be078f07f0cde633dcaf457e7c99855efc6ebf34f2d3831eafcadbd67f28617d04414ab016e7fc36f3a47a125067c8491f3f0862bb49d95965c01b9905b3bb50e355d01bfa2fc9aa44420c9635361d0eaf3c070d1bde50633e4781a3a7c3d0e7ffbaf1036c7c96d7b678079fe95875dc0d3509e1be6d9714c67491929aa82d76fca1e64f28ff65222767e86c62ae47c5d0da77b857d754c03e08cd0f181cf42865073f13636bd6b2725bf5b0c5c2dd1a09215c22eb86414d4b838aaee615ad91b8016c117e0c236ac995a01f1242ae8e8e62a0d629f01c80395e3c4246195167bbd1416de85f6653f227fd857dd7e88bdcc88bbe4ca394ad12145388627ea71597d398f85fcc44778fdf5510bad20a52ef4533203b833cb386e97b8535ab714dccb5a85d785ec9755bbd1c4c6f36e182fe21d7d72087425f9f973a9eaac54a1099e38742549c684ac46f78c1b3eabc67df1cb26c04c6d3d39bdbe1240d07c5a66fd3bbd5c397fea200836c6c1ef2171788b7995107a6ed9cb4f2755f88c57d9f1f3e49ff6c15c635783d5c70ba539c3883695abd4fc080cd4498dbaca709b62828534c42e52dd6cfa5451432d092de6e73455d843494e0b18a551508566db6b53caced1c349d85ab7d53cdb3699f232d3a01d39dcaaea487b05f65022dc90b4e222d7ea687672bfaa0d7c767e01e1e574890d516ed6104bfe18a0eeada554dc84672e0dc9c0fb53a282a9f99280bc01eff52f27ac0a3608d16618a7595884596922b7af9201212b4212881ed9faf4646e044d5f38fed2274a5183c39a9cfdfeee943f61acc9e5ebbdd3056719dbb653d384f2b1617d13b4e3cf99940417a6f5e24a339fb0aa082e15a6dcd9266b2051f08bea946a6ae7cec69eb84806f1b68d377a048f3dde1413f14c5b7511e8cce27a0f549357f2c0583c6623465a47f9e638544dd096ad51f512f00e2b40865542f6058214581150736f8cc06b18ade196448c2c52b7ca72981e50e60dc39c3fa469e9b79dbb25c100ef6586b97161fcf10510c9d3fd0cbef98cbd7b0758edc28a9e5d67ddc3769f36dd6ef74d436736e87a44882c423871be74ad4bda77f56f992a5dc62ed4d00bdb2d975aed59d88206b746086e40e2a12b6809cc83406d409430194f93c925c125d7ac806f116f22831a2be52e63114ac929dba11924bacb774f242ce613b70d030c8b8e034d0f936de25881b6f8d97b0906ee7db93a330bfa27e502666ae919a0e7680093ed03377bd6c810d72cbf25b9928c91266035d3d40aaa8379b536d788bddcf9b0161a8605569f591a180339b7e458a4ce0dd739c40cf8a1bb0ed06a0f0753c18a86a68491ff533e01fe79198739307be1dd90395a2c54069b2c82199aee17dd3de6b49023435fab140112a997c8fa0ac07df997929cd90cd2e0d1554cb4572e1669da73f64ecdaf444abecaf17a0b7825332a9c8c4d038dd7375addc20ef9132746cbc03e6beda79f888ca547b763314c1f2c78a04094f1f2b7bce8987c8be55d382390177e9890c15274323e9b55ae615486f830d58902f57a622aeab8d780f6f5a821f98419e52839b539b7fc9f0b4b053d05c2958e63b7beca3f93b15f470213a455c3aab9e72492adfca2bfc063f5f75c0784da0ec7e3fe7610a87d2d298e254fca1335b6736965720addefd6b7afc6496e5a894851ba982cb81c877eeda8e5b4cd1b0f3f98526516fe7fb5e32c"], 0x1248}, 0x1, 0x0, 0x0, 0x48804}, 0x20000040) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fallocate(r0, 0x10, 0x8000, 0x20) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, r5}) sendmsg$nl_generic(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002e80)=ANY=[@ANYBLOB="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"], 0x10a0}, 0x1, 0x0, 0x0, 0x20000841}, 0x40014) copy_file_range(0xffffffffffffffff, &(0x7f0000000200)=0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240)=0xff, 0x7, 0x0) sendmsg$nl_generic(r1, &(0x7f00000015c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={0x0, 0x224}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) io_uring_setup(0x5473, &(0x7f00000000c0)={0x0, 0x7ba7, 0x3a, 0x1, 0x1c0, 0x0, r0}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000001480)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB="1418eb00", @ANYRES16=0x0, @ANYBLOB="200000000000ffdf251200000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000810}, 0x4000000) syz_genetlink_get_family_id$nbd(&(0x7f0000001500), 0xffffffffffffffff) setsockopt$inet6_udp_int(r3, 0x11, 0xa, &(0x7f0000000000)=0x6, 0x4) 03:14:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:01 executing program 2: r0 = openat(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x12f142, 0x15c) sendmsg$nl_xfrm(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x10}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x20048851}, 0x90) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/asound/timers\x00', 0x0, 0x0) ioctl$BTRFS_IOC_INO_LOOKUP(r1, 0xd0009412, &(0x7f0000000140)={0x0, 0xffff}) r2 = syz_genetlink_get_family_id$batadv(&(0x7f0000001340), r0) sendmsg$BATADV_CMD_SET_HARDIF(r1, &(0x7f0000005a00)={&(0x7f00000011c0)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000059c0)={&(0x7f0000001380)=ANY=[@ANYBLOB='D\x00', @ANYRES16=r2, @ANYRES32, @ANYBLOB="05003500fa00000005002a0001000000"], 0x44}, 0x1, 0x0, 0x0, 0x104}, 0x84c00) ioctl$sock_ipv6_tunnel_SIOCDELTUNNEL(0xffffffffffffffff, 0x89f2, &(0x7f0000000300)={'ip6tnl0\x00', &(0x7f0000000280)={'syztnl2\x00', 0x0, 0x0, 0xfd, 0x8, 0x3f, 0xafdc8579f09f20cb, @rand_addr=' \x01\x00', @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x20, 0x7800, 0x70004, 0x9c8f6a43}}) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000380)={&(0x7f0000000340)={0x3c, r2, 0x4, 0x70bd27, 0x25dfdbff, {}, [@BATADV_ATTR_GW_BANDWIDTH_UP={0x8, 0x32, 0x5}, @BATADV_ATTR_GW_MODE={0x5, 0x33, 0x1}, @BATADV_ATTR_BRIDGE_LOOP_AVOIDANCE_ENABLED={0x5, 0x2e, 0x1}, @BATADV_ATTR_NETWORK_CODING_ENABLED={0x5}, @BATADV_ATTR_MESH_IFINDEX={0x8, 0x3, r3}]}, 0x3c}, 0x1, 0x0, 0x0, 0x40001}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r4, 0x0, 0x100000001) r5 = syz_genetlink_get_family_id$fou(&(0x7f0000001440), r1) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000001500)={&(0x7f0000001400)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f00000014c0)={&(0x7f0000001480)={0x3c, r5, 0x4, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_LOCAL_V4={0x8, 0x6, @rand_addr=0x64010102}, @FOU_ATTR_LOCAL_V4={0x8, 0x6, @multicast1}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}, @FOU_ATTR_PORT={0x6, 0x1, 0x4e24}]}, 0x3c}, 0x1, 0x0, 0x0, 0x80}, 0x0) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x10c00, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_genetlink_get_family_id$ipvs(&(0x7f0000001180), r0) sendmsg$IPVS_CMD_SET_CONFIG(r1, &(0x7f00000013c0)={&(0x7f0000001140)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001300)={&(0x7f0000001200)={0xd8, r6, 0x100, 0x70bd27, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x10001}, @IPVS_CMD_ATTR_DAEMON={0x1c, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @remote}, @IPVS_DAEMON_ATTR_STATE={0x8, 0x1, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}]}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_TUN_TYPE={0x5, 0xd, 0x1}, @IPVS_DEST_ATTR_PERSIST_CONNS={0x8, 0x9, 0x2}]}, @IPVS_CMD_ATTR_DAEMON={0x48, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_MAXLEN={0x6, 0x4, 0x2}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @broadcast}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x2}, @IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e24}, @IPVS_DAEMON_ATTR_MCAST_GROUP={0x8, 0x5, @local}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'ipvlan1\x00'}]}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x3}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x1}, @IPVS_CMD_ATTR_DEST={0x14, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_FWD_METHOD={0x8, 0x3, 0x3}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x3f}]}, @IPVS_CMD_ATTR_DAEMON={0x20, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_MCAST_PORT={0x6, 0x7, 0x4e22}, @IPVS_DAEMON_ATTR_MCAST_IFN={0x14, 0x2, 'veth1_macvtap\x00'}]}]}, 0xd8}, 0x1, 0x0, 0x0, 0x20000000}, 0x4008000) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r8 = perf_event_open(&(0x7f00000001c0)={0x4, 0x80, 0x4, 0xca, 0x24, 0x3f, 0x0, 0x1ff, 0x10, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x77, 0x1, @perf_bp={&(0x7f00000000c0), 0x5}, 0x45481, 0x8, 0x1, 0x1, 0x6e, 0xff, 0x20, 0x0, 0x1, 0x0, 0x903d}, 0x0, 0xc, r7, 0x1) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x0, 0x1, 0x5, 0xce, 0x0, 0xfffffffffffffffd, 0x20000, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xfe, 0x4, @perf_config_ext={0x8, 0x7}, 0x1042, 0x80000000, 0x5821, 0x2, 0x1, 0x4, 0x7ff, 0x0, 0x2, 0x0, 0x3}, 0x0, 0xa, r8, 0x8) ioctl$FS_IOC_FSSETXATTR(r7, 0x401c5820, &(0x7f0000000000)={0x8020}) close(r7) [ 428.909907] kauditd_printk_skb: 10 callbacks suppressed [ 428.909922] audit: type=1401 audit(1694574841.115:1005): op=security_bounded_transition seresult=denied oldcontext=system_u:system_r:kernel_t:s0 newcontext=system_u:object_r:fonts_t:s0 03:14:01 executing program 0: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0xffffffffffffff29, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x0, &(0x7f0000012900)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) mknod$loop(&(0x7f00000002c0)='./file0\x00', 0x4, 0x0) lsetxattr$trusted_overlay_opaque(&(0x7f0000001340)='./file0/file0\x00', &(0x7f0000001380), &(0x7f00000013c0), 0x2, 0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write(r2, &(0x7f0000000240)="01", 0x1) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000280)=@IORING_OP_RECV=@use_registered_buffer, 0x5) r3 = openat(0xffffffffffffffff, 0x0, 0x404100, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r0, &(0x7f0000000140)=ANY=[], 0x10) openat(0xffffffffffffffff, &(0x7f0000000300)='./file0/file0\x00', 0x0, 0x121) getdents(0xffffffffffffffff, &(0x7f0000000340)=""/4096, 0x1000) fstatfs(0xffffffffffffffff, &(0x7f00000000c0)=""/65) sendfile(r0, r1, 0x0, 0x20d315) r4 = openat$incfs(r3, &(0x7f0000000140)='.log\x00', 0x80000, 0x81) futimesat(r4, &(0x7f0000000180)='./file0/file0/file0\x00', &(0x7f00000001c0)={{0x0, 0x2710}, {0x77359400}}) [ 428.978584] 9pnet: Insufficient options for proto=fd 03:14:01 executing program 5: fork() ptrace(0x10, 0x0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:14:01 executing program 7: r0 = syz_io_uring_setup(0x3157, &(0x7f0000000140), &(0x7f0000ff0000/0x10000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000080)=0x0, &(0x7f00000000c0)=0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000006, 0x11, 0xffffffffffffffff, 0x0) r3 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000001c0)=ANY=[@ANYBLOB="1c000000010400010004000000406c2d46276812c965e0a6e739d7305aa8438b50ed0798834bebc271228d595932312ffbbc7cef4121f4162e9795d78040e60bf1a37dc8827e11679ca5487244967a053e7692a95c64fceab48669d927b5cba4f87d"], 0x1c}}, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r4, 0xffffffffffffffff) mmap$IORING_OFF_CQ_RING(&(0x7f0000ff6000/0x2000)=nil, 0x2000, 0x2, 0x12, r4, 0x8000000) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_WRITE={0x17, 0x0, 0x0, @fd_index=0x4, 0x0, 0x0}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r5 = socket$inet6_tcp(0xa, 0x1, 0x0) dup(r5) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:14:01 executing program 4: utimes(&(0x7f0000000000)='./file0\x00', &(0x7f00000000c0)={{0x0, 0x2710}, {0x77359400}}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000240)=@newae={0x50, 0x1e, 0x101, 0x0, 0x0, {{@in=@dev}, @in=@private}, [@replay_val={0x10}]}, 0x50}}, 0x0) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={0x0}}, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) [ 429.081678] Zero length message leads to an empty skb 03:14:15 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) tee(0xffffffffffffffff, r0, 0x400, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r3, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000140)=""/5, &(0x7f0000000240)=0x5) r4 = eventfd(0x1ff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001f40)=[{&(0x7f0000001e80)=""/181, 0xb5}], 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r0, 0xc424}, {0xffffffffffffffff, 0x9530}, {}, {0xffffffffffffffff, 0x18}, {r4, 0x100}, {r1, 0x8}, {r2}, {r5, 0x400}], 0x8, &(0x7f0000000100)={r6, r7+60000000}, &(0x7f0000000280)={[0x4]}, 0x8) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x166) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) syz_open_dev$vcsa(&(0x7f00000002c0), 0xb4, 0x230000) bind$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r9, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r9, r8, 0x0, 0x9bbb) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:14:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:15 executing program 2: fstat(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) r1 = syz_mount_image$iso9660(&(0x7f0000000340), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="880017000000000000170008000880f9dd7e086a345d0923640b", 0x1a, 0xb800}], 0x0, &(0x7f0000000140)={[{@uid}], [{@obj_user={'obj_user', 0x3d, '\'.]'}}, {@euid_gt={'euid>', r0}}, {@pcr={'pcr', 0x3d, 0x3f}}, {@fowner_gt={'fowner>', r0}}, {@smackfsroot={'smackfsroot', 0x3d, '\\%^\\<\xbe'}}]}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) tee(r2, r1, 0x1, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) ioctl$EVIOCSFF(r4, 0x40304580, &(0x7f00000000c0)={0x55, 0x6, 0x2, {0x400, 0x7}, {}, @const={0xf000, {0x5, 0x8001, 0x1000, 0x80}}}) 03:14:15 executing program 1: pipe2(0x0, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, &(0x7f00000014c0)={'HL\x00'}, &(0x7f0000001540)=0x1e) pipe2(0x0, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read(0xffffffffffffffff, &(0x7f0000001340)=""/77, 0xffffffffffffff51) r1 = socket$netlink(0x10, 0x3, 0xa) sendmsg$nl_generic(r1, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000001e00)=ANY=[@ANYBLOB="481200001000010000000000000000000000000005000000120000002b124680024139384e9b3e77be6f30aa83acee5be2a47a75ef002d4296f04f08e3e57bc8e35f52bda75bc8fc1b5bc8fc62772c61da0bce7269f6b2e8e744b0460300f2ff9e18d420c0d9b8eb97ee7acc0a771e503ca72fe7cc8e85abb3ea278571cb6b2d6c06c084cd0cbd3d3efa116d0f10a36cb113565c54f925a5780c0de7eb1bd8d03f2b985c19672bac5851ec50dbc45f6c818082331d8ad63c5a2972b674c9e042c31c4ce015c2bd14d3a6e61f5206a001a887a0e16d0d38b0372176a64cab6f77f2b3fddd0410c08b793a1c0896463d2982ba9dde8dc20f0c842eb82a9f8fc0ec77e37bf0e73f7c461f1a638ec25ec72b2aa0de58a1225fdd4b7cd63e4ce054df41d01d06107c1695a500615b7a87bdff2c4ff2aabb3528eecdde2d805c423b626091b68cebdd463036cb47d7979207c0249f81ef7f32d5cbd0c461ae1ad2323a86e82251c8b019d98cb9ea8f2a15f64d69c5c02616592ee19d94c0f392d08b3f02cbef691069d1bf1460f8e3a2adbdcafcc5fcffa239b741967ad7821bcdc178c942d9ec68858025eadeb95c1d0a7b436403da759e04b79252fc99808c830a7b000400ee13ffeea086e5c910cdc9f98971e53b2e0585b76ea7b2f8ae52177f87124822d7689ca8902f2d2ed8b3c73cf15116307ddca830bda251c8365ed31de015afe2c799e47fefbd7428acc43ddcb3b3972791731b801970a51b9c823128dd6e51cfc3061d5131a9335cec4de35b13781ce73e02838aea8ef5000a007b00212c21255e000000919b03c6e599a57f81a077f41934e53fab74b00f4b0ffbe8b7dcd1e5bfbc0a9d12ce8e3aa71eca211e8faecb4e0ccf8fc4d7c736ce1e1dd92260470aff8c7c4cbf6928bff953dd365b53df396873f07200d8cb62e55aa6cd0822ea076d96cb97ca3ed02521d99e624e29fdcba465718213430b48db741e3600c0b2953dcf9c74aa8e523678c986044b852947fb43068768a16e6d31ab3dc31e2c6cdba1d890d6ae6eb0a9979ad2a16851578fe0250296e246012f6559960a46c4f366f81310e7b7500d2267263ae6d89d6b8a5a6a7dd30272e171f4c5855c4e0d9588ccf517b186c8054a5310eb1886030caab803d7d5b052fc88a7fa216dc3dc3d7661d9775f363cc19fd587f11829975c3685e8c4978e4ec8a948daba670683e2b02d67cf23b669e3e0b9cebce9439a804c5bafbc38dfa9bedd428a0445ea02ef0189f567988bdf328f323196631f9bf1d6a917609d0d99211457e8ceaa41d2722f7610a3d73f8e5d7615cf822c3fd38e187373564f64d7fc0d641ceb0b725fcd6a7db8bbced60d69b1c0278105221b9883d46868f98d12baff8ec9b5d7df0fe596c97cc6fbcb9ca8f10a1f26473b0d3f6cca425e769fbf3b7aa2200cb7dd9656dc474eccb48f909819aeec6cdf2d1d2c900f88423d158f04d55e58775116557a14bb180dce9b38d1b48ed4da353f16a77a08bcb28cda338c432707c4833f1776282ad1747cf14dd52db08568733c86e35ac89283aabc2389a4fbe9000dff6799e0c07076ba9034c4c8a0ca2fcf2a3b3ff341543468bcb61b1780ca0b0acbb81d5ce821ef17531711d6165bf2d10124adac46379a058726ec0c2e49c515f7f36e7323ce36f138115f07adfc684f4bb8c78b635b4f4e4cef9ea98511b8390810b94dd47e10681df211a32c2e3d0a9b202a1b774c477fa59d4337cfde01a4666a25980f51b52763b5d2b4526cff112abe484d0ab9eec6d396ff8d4cb1ec2f692514ad0295d929b46fe55d5341835be0da62fb42b8d0e0f89bd9738dcc236c9fe0b26a60acfdedcc68c67c9ee45dc2d6409d7557c19f756f0aa50360cc97f961abf14953989360fa8adc23def9a82cd496a7574e2c6856c2f27c3a87478faf3830ecdb6ed9793afbc945f1ca36cfd9ab6bf2f44a3e44792d71a6b98d26277edcc0c30ce85906bb31c2016f286be2920dd862d65fbff7a06a4f9fb9d138c8b6ae3e9a0f86be97d04149c6c2931f61eeac5429f45be765c54001bba8e268636ed22d69f4f3327f06b82fd0577841fbfbd3885c14fd91b7f012dcd0532e3173270c8a21b311dfe5d35fd82d7569654220405740cfaf70eec3c185c9299c201641e49dedbe5eae912d55310d155dcede2c03f73d882058e53e00b17d4a793e4df5baae45dfb4fe86a7ed614c9a9a0fd24687386387d2c8a58a008767544554bc3cd1bcd767f11ebd6a1217fbb0228713d306a117bc8bb10f322036047e44eab085c22b73eea61ae0f8e65a0c2b27f326bdcc65c0fc64b0178fcaff9fa34a4287e52e2580ad0c580cdfb1fe26358d685b6695843bccc99be5e0eebd062876ecef22a984008da8d43be8ee3f7d503e3aac053c929963a1096853f3cbeec1ab942d61564635ea64d2a1f5fa05c95c7212378ea91221ab49279b3cbdd4475022834cc6b4f1e54536eda80a0724b3e7ae2103754cba3768ebace46dfa4ce45bbf2e7a3a13aecb639de66127d4218d7726046f61f9ab28511aaefcde1df3db93261507e63dbc45110631c003301155aa78b748e816e4cabc2cfb7e2c4430991c789bb338b0add073d888ef0940d23bb9c04565e7fa1a09e121dfe5910111a547610fb67cf81a4e195164dac3a2059357c0c84691602526b6a677fbd893c0ce99f84b5fc59d7fcf20a8619ee3f7907c3d88a7055e26cc9ad76faccd7cea570286012561bd1187cd8e655cfce06acbe1e4221f18c3b950db4eb9112afedb6a7a0497cee9e436286d073d1b43641d39bcb9f87a6dd8cc483a8028a94bcf67a0be57829a91144f6d1e0a044fe3ccfebf436fbc05155a9f17c745052e8e135aa7dd842077d7b2b4e6c9bd26827d26b6c00e787b211d278f3da2274a03aba22890c96fdf8a72428f62a01b8499b4b50dee4b53d52111db6f9ad143a3be21d3df016583dcecdf55733798dc9b12cfdd0471a60282bbbcf390f07c80e3c74bb18e0afcd8d9d7864984e8d9678fb30d3ac30e2602153f3cb97436a36f7137a2db751f4f0d960dbd0040a604dbb42d1ee83ae05a69a9ca91e7fe0106a2e84dec9e6a5ee4c29145e3d71afd348bf62d17df94e607250d14f9685e28435940748e1c166e4a26cfd3a5dbee2d3f82699a091159e796a2f8be8bb54af625d2b854aa0e64bcdd06fb80609cfd4df646d83488fdce8dd54cbfde0026988b39e8a5ea2fd18a05e8ba5cab27bfdea0a4701941167c52d8f71cbecc7d13444e4a6bc68fd671f1a482ba0da882736dc42707faecf9a5a7f1ec3c8117191b54b00ee94320d67289553e6dd721e8c5cc54df07304cc928f792e814a4df622b0faaa08388807fc92ae9cd6530fdf5cfa25c541a6645ee20d21b8222dc493880f5ad3af3158c912b2e9ea24c171d267976ba48aaa0323ad3edcacac8c4dff6d3e50a6331d732596219d3fcd2055d034294ce74df2ad8562c71a618a507f72cdef124df556bdbbf18f0392d6934c391f183ad4195bd1b383022aac60aee1564060015e3e6f965739dd127818eed578329341917cd345638a29fe0fa66ad00de8669972565f2a5b17355d013d672219b11ad66199f44a1cb9a9d6cea0ada746fe010baee5d81433ff2e7cddc8feba8b1b33cb25587860af3f4aaad5d7a347a804fbba74450b046bb604566486ed6132b688973ba123926ecd431ccc4fb72ed7b87dc9499e435be5f23d0d517098c7c911712d968c60605a63689396248864e24850d44839e1e11e716b09b8b62ad4f8bc7e295c8be8dca419f1979f1776d29f9961347fdeb68c2051ad4524da6b5a434690b7de6ff43a6105ed4bfd57e8ec1519432114e57a67689e5376d7ef17c8e40b0c7cb8c6f0979168227173b43a9717d0528261cb2cc60f6ae5071b75d18ac16a5ad05f09713184dad7d2b902a597e3e822a3bbb001a20f5a30183a28bab90d8f9849d231b93098545595df520ea6b8afa3af0bf5a14d2bee109e792b9dd7f505e0d4f3c58f88a5498d97d6fd54d775efcaa61840edb311958b087b359fa94177e9cb1ee1c85394389ee1ab2084cd639c4f3c25b5ffd69f877da198720a79aad5a278104b3264c3bb2fbc8f1d6d6098fd6655d442f56dd7797da0bf36ff109c1924a344c7d8b17b78f089cd70d79c66be078f07f0cde633dcaf457e7c99855efc6ebf34f2d3831eafcadbd67f28617d04414ab016e7fc36f3a47a125067c8491f3f0862bb49d95965c01b9905b3bb50e355d01bfa2fc9aa44420c9635361d0eaf3c070d1bde50633e4781a3a7c3d0e7ffbaf1036c7c96d7b678079fe95875dc0d3509e1be6d9714c67491929aa82d76fca1e64f28ff65222767e86c62ae47c5d0da77b857d754c03e08cd0f181cf42865073f13636bd6b2725bf5b0c5c2dd1a09215c22eb86414d4b838aaee615ad91b8016c117e0c236ac995a01f1242ae8e8e62a0d629f01c80395e3c4246195167bbd1416de85f6653f227fd857dd7e88bdcc88bbe4ca394ad12145388627ea71597d398f85fcc44778fdf5510bad20a52ef4533203b833cb386e97b8535ab714dccb5a85d785ec9755bbd1c4c6f36e182fe21d7d72087425f9f973a9eaac54a1099e38742549c684ac46f78c1b3eabc67df1cb26c04c6d3d39bdbe1240d07c5a66fd3bbd5c397fea200836c6c1ef2171788b7995107a6ed9cb4f2755f88c57d9f1f3e49ff6c15c635783d5c70ba539c3883695abd4fc080cd4498dbaca709b62828534c42e52dd6cfa5451432d092de6e73455d843494e0b18a551508566db6b53caced1c349d85ab7d53cdb3699f232d3a01d39dcaaea487b05f65022dc90b4e222d7ea687672bfaa0d7c767e01e1e574890d516ed6104bfe18a0eeada554dc84672e0dc9c0fb53a282a9f99280bc01eff52f27ac0a3608d16618a7595884596922b7af9201212b4212881ed9faf4646e044d5f38fed2274a5183c39a9cfdfeee943f61acc9e5ebbdd3056719dbb653d384f2b1617d13b4e3cf99940417a6f5e24a339fb0aa082e15a6dcd9266b2051f08bea946a6ae7cec69eb84806f1b68d377a048f3dde1413f14c5b7511e8cce27a0f549357f2c0583c6623465a47f9e638544dd096ad51f512f00e2b40865542f6058214581150736f8cc06b18ade196448c2c52b7ca72981e50e60dc39c3fa469e9b79dbb25c100ef6586b97161fcf10510c9d3fd0cbef98cbd7b0758edc28a9e5d67ddc3769f36dd6ef74d436736e87a44882c423871be74ad4bda77f56f992a5dc62ed4d00bdb2d975aed59d88206b746086e40e2a12b6809cc83406d409430194f93c925c125d7ac806f116f22831a2be52e63114ac929dba11924bacb774f242ce613b70d030c8b8e034d0f936de25881b6f8d97b0906ee7db93a330bfa27e502666ae919a0e7680093ed03377bd6c810d72cbf25b9928c91266035d3d40aaa8379b536d788bddcf9b0161a8605569f591a180339b7e458a4ce0dd739c40cf8a1bb0ed06a0f0753c18a86a68491ff533e01fe79198739307be1dd90395a2c54069b2c82199aee17dd3de6b49023435fab140112a997c8fa0ac07df997929cd90cd2e0d1554cb4572e1669da73f64ecdaf444abecaf17a0b7825332a9c8c4d038dd7375addc20ef9132746cbc03e6beda79f888ca547b763314c1f2c78a04094f1f2b7bce8987c8be55d382390177e9890c15274323e9b55ae615486f830d58902f57a622aeab8d780f6f5a821f98419e52839b539b7fc9f0b4b053d05c2958e63b7beca3f93b15f470213a455c3aab9e72492adfca2bfc063f5f75c0784da0ec7e3fe7610a87d2d298e254fca1335b6736965720addefd6b7afc6496e5a894851ba982cb81c877eeda8e5b4cd1b0f3f98526516fe7fb5e32c"], 0x1248}, 0x1, 0x0, 0x0, 0x48804}, 0x20000040) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) fallocate(r0, 0x10, 0x8000, 0x20) r3 = dup(r2) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'syz_tun\x00', 0x0}) ioctl$sock_inet6_SIOCDIFADDR(r3, 0x8936, &(0x7f0000000080)={@rand_addr=' \x01\x00', 0x0, r5}) sendmsg$nl_generic(r3, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000002e80)=ANY=[@ANYBLOB="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"], 0x10a0}, 0x1, 0x0, 0x0, 0x20000841}, 0x40014) copy_file_range(0xffffffffffffffff, &(0x7f0000000200)=0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000240)=0xff, 0x7, 0x0) sendmsg$nl_generic(r1, &(0x7f00000015c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001580)={0x0, 0x224}, 0x1, 0x0, 0x0, 0x4004000}, 0x0) io_uring_setup(0x5473, &(0x7f00000000c0)={0x0, 0x7ba7, 0x3a, 0x1, 0x1c0, 0x0, r0}) sendmsg$ETHTOOL_MSG_CHANNELS_SET(r1, &(0x7f0000001480)={&(0x7f00000013c0)={0x10, 0x0, 0x0, 0x8000}, 0xc, &(0x7f0000001440)={&(0x7f0000001400)=ANY=[@ANYBLOB="1418eb00", @ANYRES16=0x0, @ANYBLOB="200000000000ffdf251200000000"], 0x14}, 0x1, 0x0, 0x0, 0x20000810}, 0x4000000) syz_genetlink_get_family_id$nbd(&(0x7f0000001500), 0xffffffffffffffff) setsockopt$inet6_udp_int(r3, 0x11, 0xa, &(0x7f0000000000)=0x6, 0x4) 03:14:15 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, 0x0) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f00000002c0), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000800)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_INTERFACE(r2, &(0x7f0000000e40)={&(0x7f0000000d40)={0x10, 0x0, 0x0, 0x10000}, 0xc, &(0x7f0000000e00)={&(0x7f0000000dc0)={0x1c, r1, 0x111, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) sendmsg$NLBL_UNLABEL_C_STATICREMOVE(r2, &(0x7f0000000380)={&(0x7f0000000000), 0xc, &(0x7f0000000240)={&(0x7f0000000480)={0x30, 0x0, 0x200, 0x70bd25, 0x25dfdbfb, {}, [@NLBL_UNLABEL_A_SECCTX={0x2b, 0x7, 'system_u:object_r:syslogd_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @private=0xa010100}, @NLBL_UNLABEL_A_SECCTX={0x29, 0x7, 'system_u:object_r:getty_var_run_t:s0\x00'}, @NLBL_UNLABEL_A_IPV4ADDR={0x8, 0x4, @local}, @NLBL_UNLABEL_A_IPV6ADDR={0x14, 0x2, @local}, @NLBL_UNLABEL_A_IFACE={0x14, 0x6, 'ip6tnl0\x00'}, @NLBL_UNLABEL_A_IPV4MASK={0x8, 0x5, @remote}]}, 0xac}, 0x1, 0x0, 0x0, 0x200080c1}, 0x8000) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000100), r0) sendmsg$IEEE802154_LLSEC_LIST_DEV(r2, &(0x7f00000001c0)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, r4, 0x300, 0x70bd2d, 0x25dfdbff, {}, ["", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x10}, 0x5) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x4004, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000200), r6) ioctl$sock_SIOCETHTOOL(r5, 0x8946, &(0x7f0000000000)={'wlan0\x00', &(0x7f0000000080)=@ethtool_gstrings={0x1b, 0x1}}) syz_genetlink_get_family_id$ieee802154(&(0x7f0000000040), r0) 03:14:15 executing program 5: fork() ptrace(0x10, 0x0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:14:15 executing program 7: r0 = syz_io_uring_setup(0x4d4f, &(0x7f00000002c0), &(0x7f00000a0000)=nil, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@pass_iovec={0x1, 0x0, 0x0, @fd_index=0x9, 0x6, &(0x7f00000008c0)=[{&(0x7f0000000340)=""/142, 0x8e}, {0x0}, {0x0}, {0x0}, {&(0x7f00000005c0)=""/65, 0x41}, {0x0}, {&(0x7f0000005980)=""/106, 0x6a}, {0x0}, {0x0}], 0x9}, 0x0) syz_io_uring_setup(0x4, &(0x7f0000001a80)={0x0, 0x0, 0x4}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffc000/0x2000)=nil, 0x0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)) close(0xffffffffffffffff) pipe2(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) r5 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) socket$packet(0x11, 0x2, 0x300) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x1}, 0x0, 0x0, 0x1, 0xbba3be3bb0ac92df, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x1, 0x110, r4, 0x0) syz_io_uring_submit(r5, r2, &(0x7f0000000100)=@IORING_OP_ACCEPT={0xd, 0x3, 0x0, 0xffffffffffffffff, 0x0}, 0x8001) r6 = syz_open_dev$vcsu(&(0x7f0000000140), 0x80000001, 0x103881) setsockopt$inet_icmp_ICMP_FILTER(r3, 0x1, 0x1, &(0x7f00000001c0)={0x1}, 0x4) recvmmsg(r6, &(0x7f0000000840)=[{{0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000400)=""/208, 0xd0}, {&(0x7f0000000980)=""/4096, 0x1000}, {&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000000080)=""/20, 0x14}], 0x4, &(0x7f00000001c0)}, 0xfffffff0}, {{&(0x7f0000000240)=@ax25={{0x3, @netrom}, [@rose, @default, @default, @default, @null, @rose, @rose, @bcast]}, 0x80, &(0x7f00000007c0)=[{&(0x7f0000000500)=""/57, 0x39}, {&(0x7f0000000540)=""/4, 0x4}, {&(0x7f0000000640)=""/108, 0x6c}, {&(0x7f0000000580)=""/5, 0x5}, {&(0x7f00000006c0)=""/7, 0x7}], 0x5, &(0x7f0000001980)=""/205, 0xcd}, 0x7}], 0x2, 0x102, &(0x7f0000000700)={0x0, 0x989680}) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:14:15 executing program 0: r0 = getuid() r1 = geteuid() syz_mount_image$iso9660(&(0x7f0000000040), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000000200)=[{&(0x7f0000000140)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000010900)="8800170000000000001700080000000008007809140b2a3a0802", 0x1a, 0xb800}], 0x0, &(0x7f0000001700)={[{@map_acorn}], [{@fowner_lt={'fowner<', 0xee01}}, {@fsname={'fsname', 0x3d, '{%!*.]'}}, {@context={'context', 0x3d, 'root'}}, {@euid_lt={'euid<', r0}}, {@euid_lt={'euid<', r1}}, {@obj_type}, {@fscontext={'fscontext', 0x3d, 'staff_u'}}, {@fowner_lt={'fowner<', r1}}, {@pcr={'pcr', 0x3d, 0x1f}}]}) r2 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000080)='setgroups\x00') ioctl$INCFS_IOC_CREATE_FILE(r2, 0xc058671e, &(0x7f0000001680)={{}, {0x4}, 0x0, 0x0, 0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)="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", 0x1c9, 0x0, &(0x7f00000004c0)={0x2, 0x1b3, {0x1, 0xc, 0xbc, "875cba07306f84a9517b3317179c2376e17522faacb9d44afbbc855f252e35eecefa6fa4597a3cb65d7918db418044ab64f38f187751f82248c9260cab3ab9139eb2930817dc838178fb819163ec04d30fe4340ac84554fbd103edaacb5b410d3119eee3596986a51de980d9a02af5a2ff8459774e5989575020b353ed65d3a649a6136ed78191752f8ce75b4c2b12be72d28b9811c5cc12575fb91ec6a70b9f23e58c8406fc4baff8133133fb2ba6d00545d3a5737e1616485cce77", 0xea, "bd0de6d3ffd4066e3fdd0e0a4d5d4812181f1bc4f650c2eaeefdfdeb4f4e12417b0b176ef78d77c88ab364cb82b1988498d42eb0b99528b69923860f6e55a1a3015f2c13558a09592c833f888340d4e96145cccf1bf9eba1de6822edf42355b0fd50fab6c93a32604446fbe002878dc24252a79ee36d326d9cf78d99cfa3fdcf7b1190e1da7114525e654769609d31fa1038f6ac2288e764df5899830e4136bf5505f01b9895c6c107ab43480e110ba97ce4091958a9a3a19604ea2c746b85d43e23fb20c375222d3e240e7546503716a7f1c4a031e6df4c0a943e87b953861b441ae5350b8ff557706d"}, 0x1000, "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"}, 0x11bf}) 03:14:15 executing program 5: fork() ptrace(0x10, 0x0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:14:15 executing program 0: sendmsg$TIPC_CMD_SET_NODE_ADDR(0xffffffffffffffff, &(0x7f0000005d80)={&(0x7f0000004c80), 0xc, &(0x7f0000005d40)={&(0x7f0000004cc0)={0x24, 0x0, 0x200, 0x70bd26, 0x25dfdbff, {{}, {}, {0x8}}, ["", "", "", "", "", ""]}, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x20000000) r0 = socket$inet6_udp(0xa, 0x2, 0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000000, 0x0, @perf_config_ext={0x1, 0x5}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1000}, 0xffffffffffffffff, 0x8000000000000, 0xffffffffffffffff, 0x8) socket$packet(0x11, 0x3, 0x300) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x8, @mcast2, 0x5}, 0x1c) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x1, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000180), 0x5}, 0x409becb7bdf85d3, 0x1, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) connect$inet6(r0, &(0x7f0000004c40)={0xa, 0x4e21, 0x2, @private0, 0x600000}, 0x1c) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 03:14:15 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) sendmsg$inet6(0xffffffffffffffff, 0x0, 0x24004011) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e23, 0x1f, @ipv4={'\x00', '\xff\xff', @multicast2}, 0x3f}, 0x1c) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8}, 0x0, 0x8, 0x40000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x747d, 0x0, &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffa000/0x1000)=nil, &(0x7f00000000c0), 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00)=[{{0x0, 0x1100, &(0x7f00000004c0)=[{&(0x7f0000000080)='K', 0x1}], 0x1}}], 0x7ffff000, 0x0) 03:14:30 executing program 7: getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0xa, 0x0, &(0x7f0000000180)) stat(&(0x7f0000000900)='.\x00', &(0x7f0000000880)) chmod(&(0x7f0000000000)='./file0\x00', 0x44) ioctl$TUNGETDEVNETNS(0xffffffffffffffff, 0x894c, 0x0) rename(&(0x7f0000000140)='./file0\x00', &(0x7f00000001c0)='./file0\x00') openat2(0xffffffffffffffff, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000100)={0x22901, 0x10c, 0x7}, 0x18) rename(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00') 03:14:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x2000003) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x1000000) inotify_add_watch(r0, 0x0, 0x4000040) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000280), 0xfff, 0x0) preadv(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)=""/20, 0x14}, {&(0x7f0000000300)=""/209, 0xd1}, {&(0x7f0000000400)=""/60, 0x3c}, {&(0x7f0000000440)=""/148, 0x94}, {&(0x7f0000000500)=""/167, 0xa7}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/140, 0x8c}, {&(0x7f00000007c0)=""/107, 0x6b}], 0x9, 0x6, 0xfff) r3 = inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) inotify_rm_watch(r1, r3) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x3) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x30000002) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x210) r6 = dup3(r1, r0, 0x0) inotify_add_watch(r6, &(0x7f0000000080)='./file0\x00', 0x80) 03:14:30 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:14:30 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$nl_xfrm(0x10, 0x3, 0x6) tee(0xffffffffffffffff, r0, 0x400, 0xa) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r3, 0xffffffffffffffff) getsockopt$IP_VS_SO_GET_SERVICES(r3, 0x0, 0x482, &(0x7f0000000140)=""/5, &(0x7f0000000240)=0x5) r4 = eventfd(0x1ff) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/consoles\x00', 0x0, 0x0) preadv(0xffffffffffffffff, &(0x7f0000001f40)=[{&(0x7f0000001e80)=""/181, 0xb5}], 0x1, 0x0, 0x0) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) ppoll(&(0x7f00000001c0)=[{r0, 0xc424}, {0xffffffffffffffff, 0x9530}, {}, {0xffffffffffffffff, 0x18}, {r4, 0x100}, {r1, 0x8}, {r2}, {r5, 0x400}], 0x8, &(0x7f0000000100)={r6, r7+60000000}, &(0x7f0000000280)={[0x4]}, 0x8) r8 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x0, 0x166) r9 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r9, 0x6, 0xa, &(0x7f0000000180)=0x2, 0x4) syz_open_dev$vcsa(&(0x7f00000002c0), 0xb4, 0x230000) bind$inet6(r9, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) connect$inet6(r9, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendfile(r9, r8, 0x0, 0x9bbb) creat(&(0x7f0000000040)='./file0\x00', 0x0) 03:14:30 executing program 1: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x40) fallocate(r0, 0x0, 0x0, 0x8800000) rename(&(0x7f00000000c0)='./file0/../file0\x00', &(0x7f0000000100)='./file0\x00') pwrite64(r0, &(0x7f0000000040)="dd50efa9f9da494991b4590fbc9a2139aee9ef1325fdafdae28fe138225feed82c259910a39d182e56259f26e1ccab910e2fc113a2b7cd1cd519454d8efbb2abe74befdceb5ac76447c704c6a66b70ffbc42", 0x52, 0x2) openat(0xffffffffffffffff, &(0x7f0000000180)='./file0/../file0\x00', 0x202, 0x100) ioctl$FS_IOC_FIEMAP(r0, 0xc020660b, &(0x7f0000000140)={0x0, 0x0, 0x4}) 03:14:30 executing program 6: rt_sigaction(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000100)) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) r2 = perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x20, 0x7, 0x0, 0x1, 0x0, 0x8, 0x0, 0xc, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f0000000140), 0x3}, 0x10346, 0x48, 0x5, 0x8, 0xfffffffffffffffd, 0x4, 0x0, 0x0, 0x8, 0x0, 0x7}, 0xffffffffffffffff, 0x5, r1, 0x9) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r3, 0xffffffffffffffff) sendmsg$nl_generic(r3, &(0x7f0000000500)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000004c0)={&(0x7f0000000300)={0x184, 0x40, 0x10, 0x70bd29, 0x25dfdbfe, {0xb}, [@nested={0x16d, 0x71, 0x0, 0x1, [@typed={0x8, 0x6a, 0x0, 0x0, @fd=r0}, @generic="e0b19363cf9cb4c158fe77fcd5b3e6671b", @generic="1055d117981217af64ec5ddb5a0e86a982c7d0dd8eec1b8f691593c7483a0e9c3fb3b0992006d1469c7682567c4b9c63389eeefae24e35b558f26461cd32741c20b67268276e975ce64a7bfaf9259c81ce07bf501a540ab307df0816e2e7a429914656e09e9e69ddd144ef5d46c32dd5978bfca0b5fdfcf19d6681e7f9ea1dad548ccc1dd92350530c5f6bb87dd26b7209982ec8c1fe9cc7efc722e1a42781cf7e9e0c2b512290441e075d2a74e0e2e59cee", @generic="0ca82e1e23e74a3c55baeb0d5e1f3f514b343507eb5447e967c3b61af93a99724f42eb7b1d", @generic="0c676ed850fe7dcc9f3fca091c", @typed={0x14, 0x4a, 0x0, 0x0, @ipv6=@mcast1}, @typed={0x56, 0x36, 0x0, 0x0, @binary="d4a1a1234c2a3a8448a0731d14a5814d62ea59a625208a548c287ec9ed504c49a882c5bacee9a0fd32f8915b6e875ccb0e3f618a7964bf73b861f88ac7a08bb33a152b04cd8e7cc809fb1267af3873524b2d"}]}]}, 0x184}, 0x1, 0x0, 0x0, 0x8000}, 0x4080) ftruncate(0xffffffffffffffff, 0x1000003) openat(r1, &(0x7f0000000540)='./file0\x00', 0x0, 0x45) r4 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r4, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) fcntl$getflags(r2, 0x1) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x7ff, 0x20086, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000180), 0xa}, 0x400, 0x5, 0xdebe, 0x3, 0x495, 0x1, 0x3ff, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x24, 0x1, 0x3, 0x0, 0xfe2c, 0x0, 0x1d}}) acct(&(0x7f0000000040)='./file0\x00') r5 = socket$packet(0x11, 0x3, 0x300) ioctl$F2FS_IOC_PRECACHE_EXTENTS(r5, 0xf50f, 0x0) unshare(0x48020200) 03:14:30 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x0, [0xfffff4b7, 0xb6, 0x401]}, &(0x7f00000001c0)=0x44) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0x20, 0x0, 0x25dfdbfb}, 0x14}}, 0x0) r2 = openat$snapshot(0xffffffffffffff9c, &(0x7f00000000c0), 0x400040, 0x0) fcntl$addseals(r2, 0x409, 0x1) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) r3 = timerfd_create(0x0, 0x0) timerfd_settime(r3, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) sendmsg$NL80211_CMD_REMAIN_ON_CHANNEL(r0, &(0x7f0000000200)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000080)={&(0x7f0000000040)={0x34, 0x0, 0x1, 0x70bd2c, 0x25dfdbfe, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_DURATION={0x8, 0x57, 0x7}, @chandef_params=[@NL80211_ATTR_CENTER_FREQ1={0x8, 0xa0, 0x600}, @NL80211_ATTR_WIPHY_FREQ_OFFSET={0x8, 0x122, 0xffffffbf}]]}, 0x34}, 0x1, 0x0, 0x0, 0x8000}, 0x4000800) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) 03:14:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:30 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5c}, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x1e9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000380)={0x2, 0x8, 0x8, {0x8}, 0xaaf, 0x80000001}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffc, 0x0, 0x0, @buffer={0x0, 0x1000, &(0x7f0000001e00)=""/4096}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000080)={0x0, 0x27, &(0x7f0000000100)={&(0x7f0000000140)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0xff19, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}]}]}, 0x34}}, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x8, 0x9) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = open(0x0, 0x1810c1, 0x0) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x4c, 0x0, 0x200, 0x70bd29, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x4c}}, 0x0) r6 = dup(r2) sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="b0000000", @ANYRES16=0x0, @ANYBLOB="14002dbd7000ffdbdf250500000044000780080001008ce5000008000108e8000000080002003f0000000c00040008000000000000000c000400080000000000000008000200040000000800010000040000580006804e00030012b4269ff515ca8d6d47b9956686bcd1f1a7ed13b41d83692d9ed314c21308fde55f20c90ac276d4a79ff82c739fabaa47c6948a42615144f9cdbe324fda85de47047c799e0eb7c177dd000004000200", @ANYRESDEC], 0xb0}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) 03:14:30 executing program 4: mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x5, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000240)}, 0x8b}, 0x0, 0x3, 0xffffffffffffffff, 0x0) mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) sendmsg$NL80211_CMD_SET_WIPHY_NETNS(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x101982, 0x0) ioctl$LOOP_SET_STATUS(r1, 0x4c00, 0x0) chown(0x0, 0xee00, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r0, 0xc0096616, &(0x7f0000000180)=ANY=[@ANYBLOB="0309000000000000000000eda577b74cf8c13c7ff04266e723a45091714b17c77fa0831f177b51fc819559a2eceea3893d94020bfc32e6f150be1df02846c27c62f23e6e07f6cf2af9fbe8212768ba373069b0c94a3b5d19178e98ac005e175953aaa4154ecaab6b328af6750291727132834c2c6d0fdcd98ebbea66d3643e21ad47eb31a8104674b6ade1951fe0be674d68c571162af56f9e816edd59f1fd12ed42a8b25dde2de80ddccc77e2485bc6658b5a84e0"]) get_mempolicy(&(0x7f0000000080), &(0x7f0000000140), 0xffffffffffff1ae0, &(0x7f0000ffe000/0x2000)=nil, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) ioctl$FS_IOC_FSSETXATTR(r2, 0x6609, 0x0) r3 = getpid() faccessat2(r2, &(0x7f00000000c0)='./file2\x00', 0x80, 0x0) mlock2(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0) openat(r1, &(0x7f0000000040)='./file2\x00', 0x407000, 0x18) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYBLOB="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"/785], 0x311) ioprio_get$pid(0x3, r3) fstat(r2, &(0x7f0000000380)) fcntl$setown(r2, 0x8, r3) 03:14:30 executing program 1: r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x40, 0x0, 0x0, 0x0, 0x5e, 0x0, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x5}, 0x10000, 0x0, 0x2, 0xe, 0x0, 0x2}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r1 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000480), 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x2}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffd}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000b80)=ANY=[@ANYBLOB="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"]) lseek(0xffffffffffffffff, 0x0, 0x0) ioctl$TIOCL_SCROLLCONSOLE(r1, 0x5453, 0x0) r2 = syz_open_dev$tty1(0xc, 0x4, 0x4) ioctl$KDSETKEYCODE(r2, 0x4b4d, &(0x7f0000000040)={0x4, 0x4}) fcntl$getown(r1, 0x9) socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_setup(0x752d, &(0x7f0000000380)={0x0, 0x52b2, 0x2, 0x1, 0x68}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f00000001c0), &(0x7f0000000400)) clock_gettime(0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file1\x00', 0x46e2, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) copy_file_range(r3, &(0x7f0000000100)=0xfffffffffffff674, r4, 0x0, 0x0, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(r4, 0x80286722, &(0x7f0000000180)={&(0x7f0000000080)=""/204, 0xcc, 0x10f3, 0x1}) 03:14:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:30 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_REQ_SET_REG(0xffffffffffffffff, &(0x7f0000000b40)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000b00)={&(0x7f0000000a80)={0x50, r0, 0x500, 0x70bd2a, 0x25dfdbff, {}, [@NL80211_ATTR_REG_RULES={0x24, 0x22, 0x0, 0x1, [{0x4}, {0x1c, 0x0, 0x0, 0x1, [@NL80211_ATTR_POWER_RULE_MAX_ANT_GAIN={0x8, 0x5, 0x6}, @NL80211_ATTR_FREQ_RANGE_END={0x8, 0x3, 0x4}, @NL80211_ATTR_POWER_RULE_MAX_EIRP={0x8, 0x6, 0x2}]}]}, @NL80211_ATTR_USER_REG_HINT_TYPE={0x8, 0x9a, 0x2}, @NL80211_ATTR_REG_ALPHA2={0x6, 0x21, 'a\x00'}, @NL80211_ATTR_DFS_REGION={0x5, 0x92, 0x80}]}, 0x50}, 0x1, 0x0, 0x0, 0x4}, 0x8080) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, 0x0, 0x0, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x101001, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r1, 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_TID_CONFIG(r1, &(0x7f0000000100)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000800}, 0xc, &(0x7f00000000c0)={&(0x7f00000001c0)={0x894, r0, 0x200, 0x70bd25, 0x25dfdbff, {{}, {@void, @void}}, [@NL80211_ATTR_TID_CONFIG={0x7c, 0x11d, 0x0, 0x1, [{0x3c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xa0}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x1f}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x7ff}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xb0}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xfe}]}, {0x3c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x81}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0x56}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x3}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xf1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}]}]}, @NL80211_ATTR_TID_CONFIG={0x280, 0x11d, 0x0, 0x1, [{0x18, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x7f}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x6d}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x1}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x1ff}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}]}, {0x28, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x7e}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x4}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}]}, {0x214, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5, 0xb, 0x1}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x7}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x85}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x1dc, 0xd, 0x0, 0x1, [@NL80211_BAND_2GHZ={0x28, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8000, 0x7, 0x7f, 0x2, 0x9, 0x1000, 0x100, 0x4]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}]}, @NL80211_BAND_60GHZ={0x4c, 0x2, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x1c, 0x1, [0x1, 0x60, 0x12, 0xc, 0x1b, 0x4c, 0x6c, 0x36, 0x4, 0x60, 0x5, 0x3, 0xb, 0x24, 0x48, 0x36, 0x12, 0x2, 0x2, 0x2, 0x1, 0x0, 0x1b, 0x12]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x100, 0x1, 0x1, 0x8000, 0x1, 0x8, 0x9, 0x400]}}, @NL80211_TXRATE_LEGACY={0xe, 0x1, [0x5, 0x14, 0x1, 0x6c, 0x6, 0x18, 0x0, 0x0, 0x3, 0x1b]}]}, @NL80211_BAND_5GHZ={0x2c, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x7, 0x3f, 0x5, 0x7f, 0x2, 0x1, 0x6, 0xe40]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x9f, 0x1, 0xffe0, 0x0, 0x7, 0xd00, 0x3, 0xffff]}}]}, @NL80211_BAND_5GHZ={0xa4, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x45, 0x2, [{0x6, 0x3}, {0x5, 0x6}, {0x7, 0x8}, {0x5, 0xa}, {0x2, 0x7}, {0x7, 0x6}, {0x1, 0x1}, {0x1, 0x3}, {0x7, 0x7}, {0x5}, {0x6, 0x8}, {0x5}, {0x3, 0x1}, {0x0, 0x9}, {0x2, 0x1}, {0x5, 0x1}, {0x7, 0x6}, {0x1, 0x3}, {0x7, 0x2}, {0x0, 0x1}, {0x1, 0x9}, {0x6, 0x3}, {0x5, 0x9}, {0x6, 0x9}, {0x4, 0x3}, {0x0, 0x9}, {0x4, 0x2}, {0x0, 0x7}, {0x6, 0x2}, {0x7, 0x6}, {0x3, 0x7}, {0x0, 0x5}, {0x1, 0x2}, {0x5}, {0x6, 0x8}, {0x5, 0x1}, {0x6, 0x4}, {0x5, 0x2}, {0x0, 0x8}, {0x3, 0xa}, {0x6, 0x3}, {0x2}, {0x0, 0x8}, {0x5, 0x7}, {0x7, 0x6}, {0x3, 0xa}, {0x7, 0x2}, {0x1, 0x4}, {0x4, 0x8}, {0x4, 0x3}, {0x3, 0x4}, {0x1, 0x3}, {0x4, 0x1}, {0x6, 0x2}, {0x4, 0x5}, {0x7, 0x9}, {0x1, 0x5}, {0x0, 0x2}, {0x4, 0x2}, {0x1, 0x1d}, {0x1, 0x6}, {0x2}, {0x6, 0x2}, {0x2, 0x4}, {0x6}]}, @NL80211_TXRATE_HT={0x31, 0x2, [{0x3}, {0x3, 0x6}, {0x5, 0xa}, {0x5}, {0x1, 0x9}, {0x1, 0xa}, {0x3, 0x5}, {0x4, 0x2}, {0x5, 0x9}, {0x0, 0xa}, {0x0, 0x7}, {0x2, 0x6}, {0x2, 0x2}, {0x6, 0x8}, {0x5, 0x4}, {0x5, 0x4}, {0x0, 0x7}, {0x0, 0x5}, {0x3, 0x6}, {0x0, 0x1}, {0x3, 0xa}, {0x5, 0x6}, {0x1, 0x1}, {0x1, 0x9}, {0x2, 0x3}, {}, {0x3, 0x7}, {0x3, 0x4}, {0x7, 0xa}, {0x6, 0x4}, {0x0, 0x9}, {0x3, 0xa}, {0x6}, {0x7, 0x6}, {0x3, 0x1}, {0x7, 0x6}, {0x0, 0x9}, {0x4, 0x9}, {0x2, 0x4}, {0x3, 0x7}, {0x5, 0x7}, {0x2, 0x2}, {0x6, 0x7}, {0x3}, {0x6}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x1, 0xcf0, 0x9, 0x0, 0x6, 0xcd, 0x3, 0x1]}}]}, @NL80211_BAND_6GHZ={0x88, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x9, 0x1, [0x6c, 0x3, 0x1b, 0x5, 0x48]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0xa, 0x2, [{0x1, 0x8}, {0x7, 0xa}, {0x0, 0xa}, {0x2, 0x6}, {0x7, 0x8}, {0x1, 0x5}]}, @NL80211_TXRATE_LEGACY={0xb, 0x1, [0x30, 0x30, 0x30, 0x4, 0xc, 0x24, 0x2]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x3e, 0x2, [{0x1, 0x3}, {0x7}, {0x5, 0x4}, {0x0, 0x3}, {0x2, 0x9}, {0x0, 0x7}, {0x7, 0x2}, {0x1, 0x6}, {0x4, 0x8}, {0x7, 0xa}, {0x6, 0x7}, {0x3, 0x1}, {0x4, 0x6}, {0x7, 0x2}, {0x0, 0x1}, {0x0, 0x2}, {0x6, 0x7}, {0x1, 0x7}, {0x6, 0x4}, {0x6, 0x8}, {0x1}, {0x5, 0x2}, {0x7, 0x7}, {0x0, 0x2}, {0x2}, {0x3, 0x2}, {0x1, 0x2}, {0x3, 0x7}, {0x3, 0x2}, {0x2, 0x4}, {0x5, 0xa}, {0x4}, {0x0, 0x7}, {0x2, 0x1}, {0x5, 0x8}, {0x2, 0xa}, {0x7, 0x9}, {0x4, 0x2}, {0x3, 0x9}, {0x3, 0x3}, {0x2}, {0x1, 0x7}, {0x0, 0x8}, {0x3, 0x6}, {0x7, 0x5}, {0x4, 0x7}, {0x4}, {0x1, 0x1}, {0x1, 0x9}, {0x2, 0x6}, {0x5, 0xa}, {0x2}, {0x5, 0x1}, {0x3, 0x4}, {0x5, 0x2}, {0x6, 0x9}, {0x6, 0x9}, {0x0, 0x2}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0xc, 0x3, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}]}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5, 0x9, 0x1}]}]}, @NL80211_ATTR_TID_CONFIG={0x50, 0x11d, 0x0, 0x1, [{0x4c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x6}, @NL80211_TID_CONFIG_ATTR_AMSDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x95}, @NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x80}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}, @NL80211_TID_CONFIG_ATTR_OVERRIDE={0x4}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}]}]}, @NL80211_ATTR_TID_CONFIG={0x534, 0x11d, 0x0, 0x1, [{0x198, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_VIF_SUPP={0xc, 0x2, 0x3}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x180, 0xd, 0x0, 0x1, [@NL80211_BAND_6GHZ={0xb0, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x21, 0x2, [{0x6}, {0x1, 0x6}, {0x6, 0x8}, {0x7, 0x1}, {0x2}, {0x3, 0x5}, {0x7, 0xa}, {0x3, 0x9}, {0x5, 0xa}, {0x2}, {0x2, 0x7}, {0x2, 0x7}, {0x6, 0x3}, {}, {0x0, 0x2}, {0x2, 0x4}, {0x2, 0x6}, {0x1, 0xa}, {0x0, 0x1}, {0x0, 0x4}, {0x5, 0x9}, {0x3, 0x6}, {0x1, 0x4}, {0x4, 0x3}, {0x7, 0x9}, {0x4, 0x2}, {0x6, 0x9}, {0x2, 0x7}, {0x7, 0x4}]}, @NL80211_TXRATE_HT={0x1c, 0x2, [{0x2, 0x5}, {0x4, 0x4}, {0x5, 0x9}, {0x1, 0x2}, {0x3, 0x5}, {0x1, 0x3}, {0x1, 0x8}, {0x3, 0x8}, {0x1, 0x7}, {0x7, 0x6}, {0x6, 0x7}, {0x7, 0xa}, {0x0, 0x5}, {0x3}, {0x1, 0xa}, {0x6, 0x12}, {0x0, 0x5}, {0x3, 0x3}, {0x3, 0x6}, {0x5, 0x9}, {0x7, 0x9}, {0x2, 0x8}, {0x6}, {0x1}]}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x3, 0x5, 0x9, 0x400, 0x9, 0x0, 0xfffb, 0x20]}}, @NL80211_TXRATE_HT={0x47, 0x2, [{0x1, 0x1}, {0x3, 0x4}, {0x7, 0x6}, {0x6}, {0x1, 0x3}, {0x4, 0x7}, {0x4, 0x6}, {0x0, 0x8}, {0x1, 0x2}, {0x1, 0x1}, {0x0, 0x1}, {0x0, 0x3}, {0x7, 0x9}, {0x6, 0x3}, {0x2, 0x7}, {0x0, 0x5}, {0x7, 0xa}, {0x1, 0x8}, {0x1, 0x5}, {0x3, 0xa}, {0x5, 0x6}, {0x0, 0x8}, {0x0, 0x4}, {0x2, 0x1}, {0x5, 0x3}, {0x2, 0x9}, {0x5}, {0x3, 0x1}, {0x5, 0xa}, {0x6, 0x1}, {0x0, 0x1}, {0x7, 0x7}, {0x4}, {0x2, 0x9}, {0x2, 0x2}, {0x0, 0x3}, {0x5, 0x7}, {0x1, 0x4}, {0x5, 0x4}, {0x5, 0xa}, {0x4, 0x2}, {0x7, 0x6}, {0x6, 0x6}, {0x1, 0x6}, {0x6, 0x1}, {0x7, 0x2}, {0x7, 0x9}, {0x2, 0x3}, {0x6, 0xa}, {0x1, 0x2}, {0x2, 0x2}, {0x7, 0x2}, {0x4, 0x8}, {0x7, 0x5}, {0x6, 0x7}, {0x5, 0x1}, {}, {0x0, 0xa}, {0x6, 0x8}, {0x0, 0xa}, {0x1, 0x1}, {0x0, 0x1}, {0x4, 0x3}, {0x3, 0x6}, {0x2, 0x8}, {0x2, 0xa}, {0x0, 0x9}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_2GHZ={0x88, 0x0, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x6a6, 0x8, 0x9, 0xd85, 0x8, 0x9, 0x2, 0x3]}}, @NL80211_TXRATE_HT={0x3d, 0x2, [{0x0, 0x6}, {0x3, 0x3}, {0x6, 0x2}, {0x0, 0x6}, {0x7, 0x4}, {0x3, 0x1}, {0x3, 0x9}, {0x0, 0x1}, {0x3, 0x6}, {0x1, 0x1}, {0x6, 0x6}, {0x3, 0x6}, {0x1, 0xa}, {0x5, 0x5}, {0x6, 0x3}, {0x4}, {0x5, 0x8}, {0x6, 0x2}, {0x4, 0x5}, {0x6, 0x9}, {0x4, 0x3}, {0x7, 0x1}, {0x1, 0x3}, {0x3, 0x5}, {0x2, 0x5}, {0x7, 0xa}, {0x3, 0x4}, {0x6, 0x4}, {0x1, 0x8}, {0x1, 0x7}, {0x2, 0x6}, {0x7, 0x1}, {0x0, 0x7}, {0x6, 0x3}, {0x1, 0xa}, {0x5, 0x8}, {0x7, 0x6}, {0x3, 0x9}, {0x3, 0x11}, {0x1, 0x5}, {0x4, 0x8}, {0x0, 0x1}, {0x5, 0x9}, {0x7, 0x6}, {0x5, 0xa}, {0x7, 0x1}, {0x4, 0x8}, {0x0, 0x7}, {0x3, 0x3}, {0x1}, {0x5, 0xa}, {0x3, 0x3}, {0x6, 0x9}, {0x0, 0x8}, {0x5, 0x4}, {0x4}, {0x6, 0x8}]}, @NL80211_TXRATE_HT={0x1b, 0x2, [{0x5, 0x3}, {0x1, 0xa}, {0x0, 0x2}, {0x0, 0x7}, {0x7, 0x3}, {0x6, 0x4}, {0x1, 0x2}, {0x2, 0x5}, {}, {0x1}, {0x1, 0x2}, {0x1, 0x5}, {0x7, 0x3}, {0x3, 0x7}, {0x5, 0x3}, {0x6, 0x9}, {0x5, 0x7}, {0x6, 0x2}, {0x3, 0x2}, {0x5, 0x8}, {0x3, 0x1}, {0x7, 0x1}, {0x3}]}, @NL80211_TXRATE_HT={0x11, 0x2, [{0x1, 0x5}, {0x1, 0x5}, {0x2, 0x9}, {0x4, 0xa}, {0x1, 0x9}, {0x6, 0x7}, {0x5, 0x4}, {0x3, 0x6}, {0x4, 0x2}, {0x1, 0x4}, {0x4, 0x6}, {0x0, 0x1}, {0x6, 0x9}]}]}, @NL80211_BAND_2GHZ={0x44, 0x0, 0x0, 0x1, [@NL80211_TXRATE_LEGACY={0x15, 0x1, [0x4, 0x24, 0x5, 0x3, 0x2, 0x5f, 0x1, 0x30, 0x2, 0x60, 0x4, 0x60, 0x1, 0x0, 0x12, 0x9, 0xc]}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x12, 0x3, 0xb, 0x36, 0x2, 0x5, 0x18, 0x1]}, @NL80211_TXRATE_HT={0x19, 0x2, [{0x5, 0x1}, {0x0, 0x7}, {0x2, 0x6}, {0x7, 0x3}, {0x6, 0x4}, {0x0, 0x2}, {0x3, 0x8}, {0x7, 0x2}, {0x5, 0x2}, {0x1, 0xa}, {0x5, 0x9}, {0x4, 0x9}, {0x4, 0xa}, {0x3}, {0x7, 0x7}, {0x2, 0x9}, {0x5, 0x5}, {0x1, 0x6}, {0x0, 0x1}, {0x0, 0x7}, {0x5, 0x2}]}]}]}]}, {0x36c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TX_RATE={0x2a4, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xe4, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x13, 0x1, [0x36, 0x6, 0x36, 0x9, 0xc, 0x9, 0xc, 0x48, 0x30, 0x24, 0x6c, 0x18, 0x3, 0x48, 0x1b]}, @NL80211_TXRATE_HT={0x41, 0x2, [{0x3, 0x5}, {0x0, 0x8}, {0x5, 0xa}, {0x1, 0x5}, {0x4}, {0x4, 0x6}, {0x5, 0x9}, {0x3, 0x5}, {0x6, 0x6}, {0x3}, {0x5, 0x6}, {0x0, 0x8}, {0x2, 0x15}, {0x0, 0x3}, {0x4, 0x2}, {0x1}, {0x0, 0x1}, {0x1, 0x2}, {0x5, 0x1}, {0x7, 0x9}, {0x7, 0x3}, {0x0, 0x8}, {0x2, 0x7}, {0x0, 0x3}, {0x1, 0x8}, {0x2, 0x9}, {0x6, 0x8}, {0x7, 0xa}, {0x7, 0x8}, {0x6, 0x4}, {0x6, 0x3}, {0x6, 0x9}, {0x0, 0x4}, {}, {0x4, 0x8}, {0x7, 0x5}, {0x2, 0x4}, {0x7, 0x5}, {0x0, 0x8}, {0x6, 0x5}, {0x0, 0x6}, {0x7, 0x3}, {0x2}, {0x0, 0x8}, {0x1, 0x1}, {0x6, 0x4}, {0x1, 0x8}, {0x7, 0x7}, {0x5, 0x8}, {0x6, 0x4}, {0x0, 0x6}, {0x1, 0x5}, {0x2, 0xa}, {0x6, 0x8}, {0x1, 0x5}, {0x1, 0xa}, {0x1, 0x4}, {0x0, 0x6}, {0x1, 0x1}, {0x4, 0x3}, {0x6, 0x2}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xff26, 0x7, 0xff, 0x4, 0x9, 0x3, 0x1, 0x9]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_HT={0x3f, 0x2, [{0x4}, {0x5, 0x6}, {0x3, 0x4}, {0x1, 0x7}, {0x1, 0x8}, {0x0, 0x4}, {0x4, 0x2}, {0x1, 0x2}, {0x5, 0x5}, {0x4, 0x9}, {0x0, 0x7}, {0x7, 0x5}, {0x4, 0x8}, {0x0, 0x8}, {0x0, 0x5}, {0x0, 0x6}, {0x2, 0x7}, {0x3, 0x3}, {0x6, 0x1}, {0x2, 0x5}, {0x5, 0x5}, {0x1, 0x8}, {0x5, 0x1}, {0x6, 0x2}, {0x2, 0x5}, {0x7, 0x2}, {0x6, 0x5}, {0x3, 0x3}, {0x0, 0xa}, {0x6, 0x3}, {0x2, 0x8}, {0x1, 0x6}, {0x0, 0x4}, {0x0, 0x5}, {0x2, 0xa}, {0x5, 0x6}, {0x2, 0xa}, {0x0, 0xa}, {0x1, 0x7}, {0x2, 0x8}, {0x0, 0x4}, {0x4, 0x6}, {0x4}, {0x3}, {0x7, 0x1}, {0x4, 0x6}, {0x1, 0xa}, {0x6, 0x8}, {0x1, 0x5}, {0x5, 0x3}, {0x5, 0x2}, {0x2, 0xa}, {0x3, 0x6}, {0x0, 0x8}, {0x0, 0x5}, {0x0, 0x2}, {0x6, 0x7}, {0x0, 0x3}, {0x3, 0x1a}]}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_LEGACY={0x14, 0x1, [0x4, 0x36, 0x6, 0xc, 0x60, 0x9, 0x3, 0x1b, 0x6c, 0x2, 0x36, 0x60, 0x2c, 0x16, 0xb, 0x30]}]}, @NL80211_BAND_6GHZ={0xb8, 0x3, 0x0, 0x1, [@NL80211_TXRATE_HT={0x4b, 0x2, [{0x0, 0x2}, {0x4, 0x2}, {0x1, 0x5}, {0x7, 0x8}, {0x7, 0x5}, {0x1, 0xa}, {0x0, 0x8}, {0x4, 0x9}, {0x5, 0xa}, {0x2, 0x1}, {0x0, 0x4}, {0x2, 0x4}, {0x3, 0x2}, {0x5, 0x2}, {0x6, 0x6}, {0x7, 0x5}, {0x1, 0x1}, {0x1, 0xa}, {}, {0x3, 0xa}, {0x0, 0xa}, {0x1, 0x2}, {0x4}, {0x0, 0x5}, {0x1, 0x9}, {0x0, 0x9}, {0x3, 0x3}, {0x6, 0x8}, {0x4, 0x6}, {0x1, 0x6}, {0x7, 0x1}, {}, {0x6, 0x2}, {0x5, 0x6}, {0x2}, {0x1, 0x2}, {0x1, 0x6}, {0x6, 0x1}, {0x4, 0x6}, {0x1, 0x1}, {0x3, 0x7}, {0x1, 0x1}, {0x4, 0x9}, {0x6, 0xa}, {0x4, 0x7}, {0x5, 0x4}, {0x6, 0x4}, {0x4}, {0x1, 0x8}, {0x3, 0x9}, {0x1, 0x3}, {0x3, 0x9}, {0x6, 0x9}, {0x6, 0x4}, {0x0, 0x5}, {0x3, 0xa}, {0x6, 0x8}, {0x1, 0x5}, {0x1, 0x9}, {0x1}, {0x3, 0x3}, {0x4}, {0x4, 0x2}, {0x0, 0x7}, {0x3, 0x2}, {0x7, 0x6}, {0x2, 0x8}, {0x6, 0x6}, {0x1, 0x2}, {0x6, 0x2}, {0x5, 0x7}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x8000, 0x9, 0xbc2, 0x2, 0x401, 0xfffa, 0x1, 0x3]}}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x4, 0x2, 0x5, 0x91b9, 0x20, 0xbe4, 0x9d, 0x7]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x2, 0x8001, 0xbd, 0x3ff, 0x1, 0x7, 0x40, 0xff]}}, @NL80211_TXRATE_HT={0x1b, 0x2, [{0x2, 0xa}, {0x1, 0x6}, {0x0, 0x7}, {0x5, 0xa}, {0x0, 0xa}, {0x5, 0x3}, {0x5, 0x2}, {0x0, 0x5}, {0x5, 0x2}, {0x6, 0x4}, {0x2, 0x4}, {0x3, 0x5}, {0x7, 0x1}, {0x3, 0x1}, {0x1, 0x1}, {0x7}, {0x3, 0x1}, {0x1, 0xa}, {0x1, 0x3}, {0x5, 0x5}, {0x2, 0x9}, {0x3, 0x1}, {0x1, 0x2}]}]}, @NL80211_BAND_60GHZ={0xec, 0x2, 0x0, 0x1, [@NL80211_TXRATE_HT={0x43, 0x2, [{0x1, 0x5}, {0x0, 0x5}, {0x7, 0x4}, {0x6, 0x9}, {0x0, 0x6}, {0x1}, {0x1, 0x4}, {0x3, 0x9}, {0x1, 0x4}, {0x6}, {0x2, 0x1}, {0x5, 0x2}, {0x6, 0x3}, {0x1, 0x2}, {0x1, 0x1}, {0x2, 0x7}, {0x1, 0x7}, {0x6, 0x3}, {0x6, 0x6}, {0x0, 0x5}, {0x6, 0x4}, {0x1, 0xa}, {0x3, 0xa}, {0x6, 0xa}, {0x3, 0x9}, {0x7, 0x8}, {0x4, 0x2}, {0x4, 0x1}, {0x2, 0xa}, {0x3, 0x4}, {0x6, 0x3}, {0x5}, {0x5, 0xa}, {0x3, 0x8}, {0x7, 0x7}, {0x4, 0x6}, {0x3}, {0x6}, {0x5, 0x3}, {0x4, 0x1}, {0x3, 0x5}, {0x6, 0x2}, {0x4, 0x5}, {0x5, 0x2}, {0x6, 0xa}, {0x2, 0x9}, {0x3, 0x6}, {0x3, 0x4}, {0x0, 0x9}, {0x7, 0x9}, {0x5, 0x4}, {0x3, 0x1}, {0x1, 0xa}, {0x2, 0x3}, {0x6}, {0x0, 0x3}, {0x1, 0x4}, {0x4, 0x7}, {0x1}, {0x5, 0x5}, {0x7, 0xa}, {0x5, 0x9}, {0x0, 0x7}]}, @NL80211_TXRATE_LEGACY={0xc, 0x1, [0x30, 0x24, 0x16, 0x48, 0x48, 0x3, 0x48, 0x1]}, @NL80211_TXRATE_HT={0x32, 0x2, [{0x4, 0x5}, {0x1}, {0x2, 0x2}, {0x2, 0x6}, {0x4, 0xa}, {0x3, 0x2}, {0x6}, {0x2, 0x3}, {0x7, 0x5}, {0x6, 0x6}, {0x2, 0x1}, {0x6, 0x8}, {0x1, 0x4}, {0x1, 0x5}, {0x7, 0x5}, {0x6}, {0x3, 0x6}, {0x5, 0x2}, {0x3, 0x4}, {0x3, 0x9}, {0x6, 0x7}, {0x6, 0x7}, {0x4}, {0x4, 0x6}, {0x6, 0xa}, {0x0, 0x7}, {0x1, 0x3}, {0x0, 0x6}, {0x0, 0x4}, {0x0, 0x5}, {}, {0x2, 0xa}, {0x5, 0x1}, {0x0, 0x1}, {0x1, 0x1}, {0x3, 0x9}, {0x3, 0x5}, {0x3, 0x9}, {0x7, 0x3}, {0x2, 0x6}, {0x0, 0x1}, {0x2, 0x3}, {0x3, 0x4}, {0x3, 0x8}, {0x0, 0x9}, {0x3, 0x3}]}, @NL80211_TXRATE_HT={0x29, 0x2, [{0x7, 0x3}, {0x5}, {0x3, 0x3}, {0x5, 0x5}, {0x2, 0x5}, {0x1, 0x4}, {0x4}, {0x6, 0xa}, {0x0, 0x6}, {0x1, 0x4}, {0x2, 0x1}, {0x0, 0xa}, {0x1, 0xa}, {0x0, 0x6}, {0x0, 0x9}, {0x3, 0xa}, {0x6, 0x5}, {0x6, 0xa}, {0x1, 0x9}, {0x2, 0x4}, {0x1, 0x1}, {0x4, 0x7}, {0x4, 0x1}, {0x0, 0x1}, {0x0, 0x6}, {0x0, 0x3}, {0x2, 0x5}, {0x7, 0x8}, {0x0, 0x9}, {0x5, 0x5}, {0x7, 0x5}, {0x0, 0x4}, {0x3, 0x1}, {0x6, 0x2}, {0x4, 0x8}, {0x2, 0x1}, {0x6}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_GI={0x5}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_HT={0x15, 0x2, [{0x3, 0x5}, {0x5, 0x5}, {0x5, 0x6}, {0x5, 0x6}, {0x4, 0x4}, {0x0, 0x6}, {0x0, 0x6}, {0x2, 0xa}, {0x1, 0x2}, {0x1, 0x1}, {0x3, 0x1}, {0x7, 0x6}, {0x7, 0xa}, {0x3, 0x7}, {0x5, 0x6}, {0x5, 0xa}, {0x5}]}, @NL80211_TXRATE_GI={0x5}]}, @NL80211_BAND_6GHZ={0x18, 0x3, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14, 0x3, {[0x8, 0x3, 0x63ca, 0x1ff, 0x9, 0x1, 0xffff, 0x200]}}]}]}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_TX_RATE={0x9c, 0xd, 0x0, 0x1, [@NL80211_BAND_5GHZ={0x98, 0x1, 0x0, 0x1, [@NL80211_TXRATE_HT={0x18, 0x2, [{0x0, 0x9}, {0x0, 0x3}, {0x6, 0x8}, {0x1, 0x1}, {0x7, 0x4}, {0x5, 0x3}, {0x1, 0x7}, {0x1, 0x7}, {0x4, 0x9}, {0x2, 0x3}, {0x7, 0x2}, {0x0, 0x5}, {0x5, 0x4}, {0x3, 0x6}, {0x2, 0x8}, {0x0, 0x4}, {0x5, 0x3}, {0x0, 0x1}, {0x2, 0x5}, {0x7, 0x2}]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x1}, @NL80211_TXRATE_LEGACY={0xe, 0x1, [0x1, 0x36, 0x6, 0x5, 0x6c, 0x48, 0x1, 0x12, 0x43, 0x36]}, @NL80211_TXRATE_LEGACY={0x20, 0x1, [0x1, 0xb, 0x48, 0x12, 0x3, 0xf, 0x1b, 0x48, 0xb, 0xf, 0x3, 0x6c, 0x12, 0x16, 0x3, 0x24, 0x48, 0x4, 0x2, 0x6c, 0x30, 0x60, 0x12, 0x48, 0x2, 0xd, 0xc, 0x1b]}, @NL80211_TXRATE_GI={0x5, 0x4, 0x2}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xf96d, 0x400, 0xfff9, 0xfc00, 0x1f, 0x7fff, 0x0, 0x400]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0x91, 0x9b, 0x8, 0x0, 0x72a5, 0x7, 0x8000, 0x3]}}, @NL80211_TXRATE_VHT={0x14, 0x3, {[0xffff, 0x95, 0xa5d3, 0x3, 0x15, 0x8001, 0x101, 0xffff]}}]}]}, @NL80211_TID_CONFIG_ATTR_TX_RATE_TYPE={0x5, 0xc, 0x2}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x5}, @NL80211_TID_CONFIG_ATTR_PEER_SUPP={0xc, 0x3, 0x8}]}, {0x2c, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0x62}, @NL80211_TID_CONFIG_ATTR_RETRY_LONG={0x5, 0x8, 0xf7}, @NL80211_TID_CONFIG_ATTR_NOACK={0x5, 0x6, 0x1}, @NL80211_TID_CONFIG_ATTR_AMPDU_CTRL={0x5}, @NL80211_TID_CONFIG_ATTR_RTSCTS_CTRL={0x5, 0xa, 0x1}]}]}]}, 0x894}, 0x1, 0x0, 0x0, 0x20008050}, 0x8001) write$rfkill(r1, &(0x7f0000000040)={0x0, 0x0, 0x3, 0x1, 0x3}, 0x8) 03:14:30 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:14:30 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = inotify_init1(0x0) inotify_add_watch(r0, &(0x7f0000000040)='.\x00', 0x2000003) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000040)=0x4389, 0x0) inotify_add_watch(0xffffffffffffffff, 0x0, 0x1000000) inotify_add_watch(r0, 0x0, 0x4000040) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = syz_open_dev$vcsa(&(0x7f0000000280), 0xfff, 0x0) preadv(r2, &(0x7f0000000840)=[{&(0x7f00000002c0)=""/20, 0x14}, {&(0x7f0000000300)=""/209, 0xd1}, {&(0x7f0000000400)=""/60, 0x3c}, {&(0x7f0000000440)=""/148, 0x94}, {&(0x7f0000000500)=""/167, 0xa7}, {&(0x7f00000005c0)=""/82, 0x52}, {&(0x7f0000000640)=""/157, 0x9d}, {&(0x7f0000000700)=""/140, 0x8c}, {&(0x7f00000007c0)=""/107, 0x6b}], 0x9, 0x6, 0xfff) r3 = inotify_add_watch(r0, &(0x7f00000000c0)='./file0\x00', 0x0) inotify_rm_watch(r1, r3) ioctl$BTRFS_IOC_BALANCE_CTL(r2, 0x40049421, 0x3) inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0x30000002) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) inotify_add_watch(r5, &(0x7f0000000100)='./file0\x00', 0x210) r6 = dup3(r1, r0, 0x0) inotify_add_watch(r6, &(0x7f0000000080)='./file0\x00', 0x80) 03:14:30 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:30 executing program 0: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5c}, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x1e9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000380)={0x2, 0x8, 0x8, {0x8}, 0xaaf, 0x80000001}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffc, 0x0, 0x0, @buffer={0x0, 0x1000, &(0x7f0000001e00)=""/4096}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000080)={0x0, 0x27, &(0x7f0000000100)={&(0x7f0000000140)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0xff19, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}]}]}, 0x34}}, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x8, 0x9) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = open(0x0, 0x1810c1, 0x0) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x4c, 0x0, 0x200, 0x70bd29, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x4c}}, 0x0) r6 = dup(r2) sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="b0000000", @ANYRES16=0x0, @ANYBLOB="14002dbd7000ffdbdf250500000044000780080001008ce5000008000108e8000000080002003f0000000c00040008000000000000000c000400080000000000000008000200040000000800010000040000580006804e00030012b4269ff515ca8d6d47b9956686bcd1f1a7ed13b41d83692d9ed314c21308fde55f20c90ac276d4a79ff82c739fabaa47c6948a42615144f9cdbe324fda85de47047c799e0eb7c177dd000004000200", @ANYRESDEC], 0xb0}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) 03:14:43 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:14:43 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x3340}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2490}, {r2, 0x11008}], 0x5, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x5]}, 0x8) 03:14:43 executing program 1: setsockopt$inet_tcp_TCP_ULP(0xffffffffffffffff, 0x6, 0x1f, &(0x7f0000000000), 0x4) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0x800, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0xf24, 0x0, 0xaa, 0x0, 0x8, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) pwritev2(r1, &(0x7f00000001c0)=[{&(0x7f0000000040)="19f4f9625dc10e994b3c1f2ec09cd1b792ae19e3f24e0f1398339bc69f5aa45d9c5b86e6f338294b87d27b62e8d22320071b58610f79fed07965860e4c1e3846eb909e5df11e9813325eabe41abd402073c2", 0x52}, {&(0x7f0000000100)="0363ea095d15d6a3eb0bdb764b2eb44a3f9b617c89735ab356671dd78929e9582afaa6f2da7505bda52b900b686e08dd9f161b9b2d4bd7b860a787292311412e3040ecd44f404b0b05fce92c9a0c0e09f23fe8c4cf4fc293932da9e5f27752eb9f622138035a9c8a5bf5e48a8d660c3623f1932e7c0ac7c3ddd25a2e29a6f030025ba3eef532584255cef27fe6091f8a019f385849500f8cd16f8471", 0x9c}, {&(0x7f0000000ac0)="55f65f8c64b7bf2a73d843af80976e8e0e5a25f4b1d33b65523077191dab1ac6f0c97e76f208dfba73aaf1b2ef33ea32096e7a8f481b659099968a5b3ef0e9b2ec895379329b65f38fe826c1e590353c0bf8dd9361630bd093420f060eec2cbfa66b9baad54e04b4f05514af83789a6e0699ebed30f85685f933e374dc267c1a2ddf093389453e05389076f4d4ca4df067472c34fd1e701fb45d55efb03cc4b8ae92f5ef224eba3eda30a37af90c05ef240dc1283991988538d22b34d19ab0af5d17ce2d24883ed8d78f", 0xca}], 0x3, 0x40, 0x200, 0xe) ioctl$DVD_READ_STRUCT(r0, 0x5392, &(0x7f0000000280)=@manufact={0x8, 0x0, 0x800, "bae3b733724c5490382e875c3226f4cbc315e12fca4acec9a5888f84339cd78f4e72c2b02c5aa9aad7422425b4d938485cc1e42badca3f80d350f568a999d164b7ed9c04c3c491b301c3ff86bdf673a129329044e428b76bb11cfdde000ab5afaee1c934534a3d76e6234d037051fb0262929c13825b8ed961479241cda084dd8cb2ee82dad1e75edc25380b849767083a3ae2b3c54368dcc61ab1aa61c678d71268119a0cf4d5c0569d300ec423cb5a9c54eb14609321b0770ca8517a202240fdbe3a987bef1ff9050efeb4a580975f5606b0a6c2c5b55374b00da32f41987ead04deb123bf095637944bc6410d90b01f7def548777522a4ddd78faad2d561bc0c8676dfd6121e221a09f4f0a0400b2ef9ddfa06887fdbbba4c6bc3f3cc4cbd9e4610c7289def8092f4d9b0e0942612e5277c3126de24a2632be3808abcbeff8a01de74bd71b7307d78819128899489ba2484c576e521336e51f4c00a6b427557c171ac6c20ad0db12366f48c0e1a8d5f5c9b9f5afa572aa776bd8b9e1452e671fd7803c9b3c4c69c70de016d10a50cb5f35973ffacf9fa081d9edc6cb8dd8ec596ee48a078b4a622899b1b97fc06c6e166db61b2b4a32ad80daed2107da6a5fdffcd41660f79ea65d7a198b5b8b6bfd149b0d412beea4f88577f951e248840bb5bc081fa3399fcca1d2ee7cc47d056b841c1e777dd04f7b1a1308b5470b10f3574769b6ebea868d2d8cca348c6173e9fec0ab9002ec1422d98f62c3ea6570fd060b36ea816c3f5db232445437885e710139f9325559b1157cb79b4847fe8b15c7d66d32e91dbfc47779ae1eff2852dd8b9e3bcd2404acac14dd3d50aea2c4f6c7158f611ca755962f5ae27e6fe36068b39f03bf73aea529541a79a91639d68ff210cc7f903a52e6ccb9c7164d75daea7562926cd0834981692d8889a3e755dfa51f81d389060fabe08a35cd3df5a07c055dbd27157e365c220679c254cacb5a7ab9b2eacf02b8a4d26101f240b8009389a124f9df5e9db31f8196e3839954271bfcc8aa6fa1dc774c162032c852dc37b9e0f86c5620f60177cc88fad441fe3bec9dccedb4c9d5a95e2b0f5ae20ca4d632189d62f8f6e1f747b2947c46b0614fdda8586a91f28c6502c4c9cadd505ad16810675335e6a38a6e9c75387dbf732ebefc4c2522fabd2a5a392bbc11530082e4bd1ed4a80bb29d9bf71470f450d45f53f27e01df4236b6b609dded90a9c1ced4c12c17d0e8530a6cdb8a2f433bbd54c9b0019d9e6bb7c476ff1872eb77582907c5233a61da60859504c262e23d6e7b085cae6988439b110982300122fc72f827e176e0259c4ce4cb3c9adc71655b1c8310247f21f6595882915f3aa40da0c11424af529031ad2010ab2af3477f2f106b09ddc0262bb854b10fa867fde464b36cb33cb379ff426e4139ecebc0a13f25a69e7affe790932e9b2975f8cb40a0049992a8f827f77766843b5c07355c5c84d3063f0e6a87ad4f71613deff7a2ad85eadaf9745936fb11ed0c16bc03615c108d60201a8cd5b3556d4d0939a5831af73add63c9f57265d73d62fe72b7324667ca4e740abf2e98e02a663ba0d2684ad3200f9270fde365103618ddc8430196d7ca0babad741046153ca12fc1a791acce8ec2e266e74f81348c12376061768d100f64f81c4821aed7ff3323b18b350aea194419c27e24efaffe46d2eea3e7e34a1da74283878b326c4fadab0abfd1de0ebb96df982dd72fad630c3a65748a9d92e1e0a43f9ce32869e9d7c178691259a4830d76ae537fad218239995c5f43c409d2ee86b5c989ab32e876f71ae1612d447353b5907e1dfcc52514fbdac3969b2abe5c8d77fad09c49d7863daccf35efe62608001e5cf83accc10854c1895bd9c972a385691635ae47280d4eef0eef99060175dc864b82d72b11e647dd7ba3bf079507bb2893db2bb4024ccdd07f6c18888067a16cf1a125d092bed2725133b8188b786a24737a5877d50fe3ab18add30ee8315ee194279ab4a1b1d99d712ab06bcadae815619469eb6db7ce58b3620961dd2e4990280abf3acf13a418125f945eec8745f904b4db95b9dc34639875b6b81b39bf237bea859f47d9ccee367d2697cecd246e03d5ab96ac8b7f25ecccb39568051b0619fd78bd7ebc3aa3a5c78d61f121770ee1ee80b6a3c24abc48d24bebeb49debc42066e666f735368703c8da064a7c2e786c7767f56744fafe87457af4f6daf1da99800bce4f279751bfe565ae003d8363a055cfbdc697042b5ee1f367caf670f686893ff7104f90f904e053fa47c75b416dea1725497ef132e2bb8589a4dffd3200b31afff5e43f32cdbe0eb8ebf660bf4aee09741c0aeda24feb992f374fcc36b6e9c3573fbbbf71c74ce607f185bebb7478cf7f1aaeb8f208c11fb393ea4ed97c77ba74e5c3a859af9c9c3a0512908ceb0ead9a10ab476805d32b46e7ef843ec79d511be879487753f5d70b3c6e73333c1ffc240679b748fd34bb56ab1240bbd850a27a8d3ebe0ac69ecb30a50215327c8c577f0927db5e8a0b1a6a61af3e523d19e8f0d86a0fea42c1c59832dcd56478472ae140a7e034a5e4b3937343fe0bea674d98b90d9c42a7607499ff3ad4c00d201fa84b66ae2877592d95866a22ba5e736df2575b5cf9679e7e22503552089039b7c66782fda60bd9288835a0ce3d20393d6974072a2a9b94676a527b5eab3cc5509362d0b13390cb216f38eddb3043f6bb1af96923825fec83c3688ee02f919b5b442b2dacad6a58acfe64b9e977e9e629eee49886732df93b6f2e46738b8b38b7de40c3ca9f1a3724a3b51be2aa9e4917d98737d05ba3875be3cd8a36bce34e1aa219232bd25583e45b212a87b5ade76a1742a050c9f404f0"}) 03:14:43 executing program 6: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f00000001c0)={&(0x7f00000002c0)="18ff151661f4c0fe55f2902ed49bb276b1a89cfe95478915cb567ce0667ee26b81cdfa7fcdf61cca43e743cb085fe0ffa4ae901b3afb69bc4c4e18dedb0f631dcd", 0x41}, 0x1, 0x0, 0x0, 0x4}, 0x11) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) fcntl$setstatus(r0, 0x4, 0x75f3d7ae72e8c575) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) pread64(r3, &(0x7f0000000400)=""/254, 0xfe, 0x9) sendmsg$inet(r3, &(0x7f0000000700)={&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)="367457e576501aa379b3f10d5aa5512dd049f7dfb7a4c93be1fb004b48b0c48542e49682599eb18f8465e6", 0x2b}, {&(0x7f0000000540)="8634e0d8483a1333b71618523b71603f05d802c45e844ea84d6a218b4570071c31943e89f98a2a36ebdfea35aa795abc0c6838c6d18669fb911cfdb8ba03662d60911f536f42465067fbe562aaea1ba7f1d19c3333ad69f4ee7e", 0x5a}, {&(0x7f00000005c0)="1ec451ac180948328bf3d3cf5423a25aa2363a38290ef1251608a73557f48bbe67fada6548715d2698cbce758e4bf363904b89a24381d750db94386d1304201dc79ded7222b5135b457a4474d0b15fb3", 0x50}, {&(0x7f0000000640)="1aa2aa1cc7edee4b51a43a012a95c5faece6b7ec536e68eba2f0ad7a6d318cbfde2b7a65e7ff53b9d4f002538adacbcddca1e1199a638ea46e3e8bc3f046c746b3af4d109a4313ecabb48f28e5680ffecbbdc0db57e6c544", 0x58}], 0x4}, 0x40000) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x2}, &(0x7f0000000080)=0x28) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x80, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000780)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd=r2, 0x0, 0x0, 0x6, 0xa, 0x1, {0x0, 0x0, r4}}, 0x8) 03:14:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:43 executing program 0: pipe2(&(0x7f0000000000)={0x0, 0x0}, 0x0) r1 = socket$inet(0x2, 0x2, 0x1) connect$inet(r1, &(0x7f0000000040)={0x2, 0x0, @remote}, 0x10) setsockopt$inet_opts(r1, 0x0, 0x4, 0x0, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_group_source_req(r2, 0x0, 0x2e, &(0x7f0000000100)={0x1, {{0x2, 0x0, @multicast2}}, {{0x2, 0x0, @remote}}}, 0x108) close_range(r0, 0xffffffffffffffff, 0x0) 03:14:43 executing program 7: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000100), 0x24000, 0x0) ioctl$EVIOCGNAME(r0, 0x80404506, &(0x7f0000000140)=""/220) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x3, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, @perf_bp={0x0}, 0x23, 0x1, 0x0, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_io_uring_submit(0x0, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x13, r1, 0x0) r2 = fsopen(&(0x7f00000000c0)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) read(0xffffffffffffffff, &(0x7f0000000280)=""/123, 0x7b) writev(0xffffffffffffffff, 0x0, 0x0) 03:14:43 executing program 2: syz_open_procfs(0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x5c}, 0x0, 0x2000000000, 0x0, 0x0, 0x0, 0x1e9b}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000000)=[{&(0x7f00000000c0)=""/213, 0xd5}], 0x1) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) ioctl$SNDRV_SEQ_IOCTL_GET_QUEUE_STATUS(r1, 0xc05c5340, &(0x7f0000000380)={0x2, 0x8, 0x8, {0x8}, 0xaaf, 0x80000001}) ioctl$SG_IO(r1, 0x2285, &(0x7f00000011c0)={0x53, 0xfffffffffffffffc, 0x0, 0x0, @buffer={0x0, 0x1000, &(0x7f0000001e00)=""/4096}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) r3 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000000)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r2, &(0x7f0000000080)={0x0, 0x27, &(0x7f0000000100)={&(0x7f0000000140)={0x34, r3, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r4}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0xff19, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS, @NL80211_TID_CONFIG_ATTR_TIDS={0x6}]}]}]}, 0x34}}, 0x0) fallocate(0xffffffffffffffff, 0x8, 0x8, 0x9) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r5 = open(0x0, 0x1810c1, 0x0) sendmsg$TIPC_NL_LINK_GET(r5, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000240)={&(0x7f0000000180)={0x4c, 0x0, 0x200, 0x70bd29, 0x0, {}, [@TIPC_NLA_MON={0x24, 0x9, 0x0, 0x1, [@TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0xfffffffe}, @TIPC_NLA_MON_REF={0x8, 0x2, 0xfff}, @TIPC_NLA_MON_ACTIVATION_THRESHOLD={0x8, 0x1, 0x1}, @TIPC_NLA_MON_REF={0x8}]}, @TIPC_NLA_BEARER={0x14, 0x1, 0x0, 0x1, [@TIPC_NLA_BEARER_NAME={0xd, 0x1, @udp='udp:syz0\x00'}]}]}, 0x4c}}, 0x0) r6 = dup(r2) sendmsg$TIPC_NL_BEARER_SET(r6, &(0x7f0000000340)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000000200)={&(0x7f0000000400)=ANY=[@ANYBLOB="b0000000", @ANYRES16=0x0, @ANYBLOB="14002dbd7000ffdbdf250500000044000780080001008ce5000008000108e8000000080002003f0000000c00040008000000000000000c000400080000000000000008000200040000000800010000040000580006804e00030012b4269ff515ca8d6d47b9956686bcd1f1a7ed13b41d83692d9ed314c21308fde55f20c90ac276d4a79ff82c739fabaa47c6948a42615144f9cdbe324fda85de47047c799e0eb7c177dd000004000200", @ANYRESDEC], 0xb0}, 0x1, 0x0, 0x0, 0x20000010}, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'wlan0\x00'}) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000240)={'wlan1\x00'}) 03:14:43 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, 0x0, 0x8, &(0x7f00000003c0)) 03:14:43 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r3 = dup2(r2, 0xffffffffffffffff) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000240)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x2c, 0x1, 0x4, 0x3, 0x0, 0xffff, 0x100, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_config_ext={0x3ff, 0x53}, 0x44262, 0x5, 0x4, 0x9, 0x10000, 0x9, 0x1a7, 0x0, 0x4, 0x0, 0x401}, 0x0, 0xe, r4, 0x1) r6 = fcntl$dupfd(r1, 0x0, r1) sendmsg$nl_generic(r6, 0x0, 0x20000800) perf_event_open(0x0, 0x0, 0x2, r6, 0x2) io_setup(0xf7, &(0x7f0000000000)=0x0) io_setup(0x9, 0x0) io_cancel(0x0, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x3, 0x1c5, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0) r8 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe8b02, 0x0) io_submit(r7, 0x2, &(0x7f0000000380)=[&(0x7f0000001080)={0x0, 0x0, 0x0, 0x0, 0x0, r8, 0x0}, &(0x7f0000000140)={0x0, 0x0, 0x0, 0x0, 0x3, 0xffffffffffffffff, 0x0}]) ioctl$LOOP_SET_FD(r3, 0x4c00, r0) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, 0x0, 0x0) 03:14:43 executing program 2: write$P9_RREMOVE(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, 0x0) r0 = perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f00000000c0)={0x0, 0x80, 0x80, 0x2, 0xf7, 0x54, 0x0, 0x8, 0x2001c, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3a, 0x2, @perf_config_ext={0x8, 0x9404}, 0x4000, 0x4, 0x8, 0x1, 0xffffffffbffff410, 0x3134, 0x5, 0x0, 0x5b73, 0x0, 0xc1}, 0x0, 0x10, r0, 0x2) r2 = clone3(&(0x7f0000000140)={0x11060900, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = gettid() kcmp(0x0, r3, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) tgkill(r2, r3, 0x18) signalfd4(r0, &(0x7f0000000440)={[0x7f]}, 0x8, 0x80000) syz_read_part_table(0x4, 0x2, &(0x7f0000000000)=[{&(0x7f0000000240)="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", 0x10f, 0x11a}, {&(0x7f00000001c0)="3e85afcd1ebf19836434dce487cd5a923f9001f97417b0b71480ebd00cde427e49614504ef8e956a24e7e139253c706f50041aa5c5906da3d4fc0a4c9e0724c752bb0cee0d3e3895a20e6a5ebcb5ddaa70cb15be8f18036b03c82cf6d637902979a7626bb5331132148a6878f6819c49ae2de988959c6f52cebfc936222345b7", 0x80, 0x7}]) r4 = fcntl$dupfd(r0, 0x0, r1) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r4, 0xc0189373, &(0x7f0000000380)={{0x1, 0x1, 0x18, r1, {0x4d}}, './file0\x00'}) [ 470.992414] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 470.996986] ext4 filesystem being mounted at /syzkaller-testdir376460658/syzkaller.FLXysr/48/file0 supports timestamps until 2038 (0x7fffffff) 03:14:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:43 executing program 1: ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) r1 = openat(r0, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r1, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r1, 0x40086602, &(0x7f0000000000)) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file0\x00', 0x105142, 0x0) r3 = pidfd_getfd(r2, 0xffffffffffffffff, 0x0) unlinkat(r3, 0x0, 0x200) creat(0x0, 0x0) fcntl$setlease(0xffffffffffffffff, 0x400, 0x0) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x104, 0xf, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3, 0x100}, 0x45960, 0x6, 0x80000001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) lseek(r2, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x4000, 0x0) copy_file_range(r4, 0x0, r2, 0x0, 0x200f5ef, 0x0) 03:14:43 executing program 6: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f00000001c0)={&(0x7f00000002c0)="18ff151661f4c0fe55f2902ed49bb276b1a89cfe95478915cb567ce0667ee26b81cdfa7fcdf61cca43e743cb085fe0ffa4ae901b3afb69bc4c4e18dedb0f631dcd", 0x41}, 0x1, 0x0, 0x0, 0x4}, 0x11) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) fcntl$setstatus(r0, 0x4, 0x75f3d7ae72e8c575) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) pread64(r3, &(0x7f0000000400)=""/254, 0xfe, 0x9) sendmsg$inet(r3, &(0x7f0000000700)={&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)="367457e576501aa379b3f10d5aa5512dd049f7dfb7a4c93be1fb004b48b0c48542e49682599eb18f8465e6", 0x2b}, {&(0x7f0000000540)="8634e0d8483a1333b71618523b71603f05d802c45e844ea84d6a218b4570071c31943e89f98a2a36ebdfea35aa795abc0c6838c6d18669fb911cfdb8ba03662d60911f536f42465067fbe562aaea1ba7f1d19c3333ad69f4ee7e", 0x5a}, {&(0x7f00000005c0)="1ec451ac180948328bf3d3cf5423a25aa2363a38290ef1251608a73557f48bbe67fada6548715d2698cbce758e4bf363904b89a24381d750db94386d1304201dc79ded7222b5135b457a4474d0b15fb3", 0x50}, {&(0x7f0000000640)="1aa2aa1cc7edee4b51a43a012a95c5faece6b7ec536e68eba2f0ad7a6d318cbfde2b7a65e7ff53b9d4f002538adacbcddca1e1199a638ea46e3e8bc3f046c746b3af4d109a4313ecabb48f28e5680ffecbbdc0db57e6c544", 0x58}], 0x4}, 0x40000) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x2}, &(0x7f0000000080)=0x28) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x80, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000780)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd=r2, 0x0, 0x0, 0x6, 0xa, 0x1, {0x0, 0x0, r4}}, 0x8) 03:14:43 executing program 0: ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, 0xffffffffffffffff) syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000500)='ramfs\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x100000, 0x0) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r0 = getpid() r1 = getpgid(0x0) r2 = epoll_create(0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000040)={r2, r3}) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000480)={0x1, r0}) mount$bind(&(0x7f00000003c0)='./file0\x00', &(0x7f0000000400)='./file0\x00', 0x0, 0x221004, 0x0) umount2(&(0x7f0000000040)='./file0\x00', 0x0) mount$bind(&(0x7f00000000c0)='./file0\x00', &(0x7f0000000240)='./file0\x00', &(0x7f0000000280), 0x14, 0x0) mount(&(0x7f0000000300)=@md0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='pipefs\x00', 0x1000001, &(0x7f0000000440)='pipefs\x00') umount2(&(0x7f0000000000)='./file0\x00', 0x0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mount$bind(&(0x7f00000002c0)='.\x00', &(0x7f0000000080)='./file0\x00', 0x0, 0x2154d4, 0x0) mount(&(0x7f0000000540)=ANY=[@ANYBLOB="2f6465762f02761da9010a9e32ba8ad84c847755722eb567db55a327afddd485cc4c21755fc372b6177aeca84da65d70f4f0858c91018b2a2f1d0a09f97a2ae2f96c79d7c03b149f6cc0b2"], &(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='exofs\x00', 0x11027, 0x0) 03:14:43 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000040)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x200}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x14, 0x0, 0x400, 0x70bd2b, 0x25dfdbfc}, 0x14}, 0x1, 0x0, 0x0, 0x24040044}, 0x20000884) setgroups(0x2, &(0x7f00000000c0)=[0xee01, 0xffffffffffffffff]) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) fcntl$getflags(r2, 0xb) 03:14:43 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 471.258865] pipefs: Unknown parameter 'pipefs' [ 471.342818] pipefs: Unknown parameter 'pipefs' [ 471.553024] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 471.558277] ext4 filesystem being mounted at /syzkaller-testdir376460658/syzkaller.FLXysr/49/file0 supports timestamps until 2038 (0x7fffffff) 03:14:56 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, 0x0, 0x8, &(0x7f00000003c0)) 03:14:56 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x3340}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2490}, {r2, 0x11008}], 0x5, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x5]}, 0x8) 03:14:56 executing program 6: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f00000001c0)={&(0x7f00000002c0)="18ff151661f4c0fe55f2902ed49bb276b1a89cfe95478915cb567ce0667ee26b81cdfa7fcdf61cca43e743cb085fe0ffa4ae901b3afb69bc4c4e18dedb0f631dcd", 0x41}, 0x1, 0x0, 0x0, 0x4}, 0x11) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) fcntl$setstatus(r0, 0x4, 0x75f3d7ae72e8c575) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) pread64(r3, &(0x7f0000000400)=""/254, 0xfe, 0x9) sendmsg$inet(r3, &(0x7f0000000700)={&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)="367457e576501aa379b3f10d5aa5512dd049f7dfb7a4c93be1fb004b48b0c48542e49682599eb18f8465e6", 0x2b}, {&(0x7f0000000540)="8634e0d8483a1333b71618523b71603f05d802c45e844ea84d6a218b4570071c31943e89f98a2a36ebdfea35aa795abc0c6838c6d18669fb911cfdb8ba03662d60911f536f42465067fbe562aaea1ba7f1d19c3333ad69f4ee7e", 0x5a}, {&(0x7f00000005c0)="1ec451ac180948328bf3d3cf5423a25aa2363a38290ef1251608a73557f48bbe67fada6548715d2698cbce758e4bf363904b89a24381d750db94386d1304201dc79ded7222b5135b457a4474d0b15fb3", 0x50}, {&(0x7f0000000640)="1aa2aa1cc7edee4b51a43a012a95c5faece6b7ec536e68eba2f0ad7a6d318cbfde2b7a65e7ff53b9d4f002538adacbcddca1e1199a638ea46e3e8bc3f046c746b3af4d109a4313ecabb48f28e5680ffecbbdc0db57e6c544", 0x58}], 0x4}, 0x40000) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x2}, &(0x7f0000000080)=0x28) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x80, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000780)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd=r2, 0x0, 0x0, 0x6, 0xa, 0x1, {0x0, 0x0, r4}}, 0x8) 03:14:56 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f00000002c0)='./file0/../file0\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x173000, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[], 0x478) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) preadv(r0, &(0x7f00000001c0)=[{&(0x7f0000000000)=""/68, 0x44}, {&(0x7f0000000080)=""/68, 0x44}], 0x2, 0x4, 0x5) r1 = syz_mount_image$tmpfs(&(0x7f0000000000), &(0x7f0000000080)='./file0/../file0\x00', 0x0, 0x0, 0x0, 0x2b31823, &(0x7f0000000300)=ANY=[]) r2 = fcntl$dupfd(r1, 0x0, r1) fchown(r2, 0x0, 0xee01) unlinkat(0xffffffffffffffff, &(0x7f0000000180)='./file0\x00', 0x0) r3 = syz_open_dev$vcsu(&(0x7f0000000040), 0x3f, 0x200003) renameat(r3, &(0x7f00000000c0)='./file0/../file0/../file0\x00', r2, &(0x7f0000000140)='./file0\x00') r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x40001, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) r6 = dup2(r5, r4) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r7, 0x0, 0x100000001) sendmsg$nl_generic(r7, &(0x7f0000000880)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x9241c7ab86c41cbc}, 0xc, &(0x7f0000000840)={&(0x7f0000000380)={0x4a4, 0x27, 0x300, 0x70bd2b, 0x25dfdbfe, {0x9}, [@generic="85c9ec20648f36edf64d3ef1c2dfa21daa2039d88d3c17a2c33739be062406f5d9fd3b6d954b43195c2bcdcabbdfb363e1500e2dff6bd450ee8b80b1258d2ec55206c9305968f8a8d1eff368c331a3a5b9f1d0994932602af95d2b384dd527ce92b56ea19e299c6c50a13f20454de0b68dd6054521cd27cdc9a3dfbd5c62f41c550e61841d159ea8a5d1ebab106823506ba19155ee8de0c642b3474c8c142857", @typed={0x8, 0x3c, 0x0, 0x0, @ipv4=@local}, @typed={0x8, 0x73, 0x0, 0x0, @u32=0x7}, @nested={0x218, 0x73, 0x0, 0x1, [@typed={0x10, 0x9, 0x0, 0x0, @str='-\xde}}[-\xbf:+[%\x00'}, @generic="2457a30bfcf2fe8a8f401e7eafe94a0291fb4c3abf0d5dc83298b8e1d1ad687e11c9f88125c11a0431f4c2a53f74c72c3b638127881ad141e4b01b1d16268ef2b4291403bae4a4f508d787d80385f5b3623f6283eea44079b617e5b29f6461755580845f6f6b6e0f429bd73d4f64868fa9178a7356b32a45ef2b986960a1ffc9ca8a29178e96788a29971b39088cff5899776fd56923ed7dfeefa5e09d657ea3", @typed={0xf, 0x53, 0x0, 0x0, @str='/dev/vcsu#\x00'}, @typed={0xc, 0x7d, 0x0, 0x0, @u64=0x27d}, @generic="53dbe91a8c667aa7e0440ea89dce9922c8a2ad9091e3b6e359e1af64b7eb1f4536cf8df73b88891755125307da3cc02a83dae387d16778a423769c4c2d0dfc03e293ec4237398bb18058c06da823", @typed={0x8, 0x18, 0x0, 0x0, @fd=r0}, @generic="155747fff609ab79ef02ef35bb024d04f1c23e1251d9b0cf0f0cfee890dce692670d022b68ce73927fedfb1b3c1c83b7b0947d1cef4ed8dced9f9f0309b89160de454dd3a9eda353373522a1098fa4469c7eb27900879e4496cd1e7f4c54ee97db3a6fb2c58b6eca85aa3d8df9dfa4a68a946b6b27940db07e26a535286fed1ed766e74db28c58e7664bee868a95f035c9d2e13af2ff8183b83a7aa71056819dcbad94de21cfd1579cc87c6d0d4b5499fdb6415a2f1d869da0709cba23a8834dc0c22f3a8888cf04f217870756c0d78bbd1ad801ca3d5fa19e6730321d22bb1225176e81d34ab0fc31e3", @typed={0x8, 0x24, 0x0, 0x0, @ipv4=@remote}]}, @generic="a53c5de5de054775811fe7f1984a4ea415ab29ccbb26a4e4055124cbd482984d65d060d9814abda8dfad5bf1da113589c3128dd9203ca25b6f98ea22f9f70d3ba713f8ce132c063a5069d73ada5f106780c3f996271f81116bb41d2fb648632494d53b5f24f2eec7b4daa717f5a6991e96d348f75886d9547e22f399adf7729dd5ac7e116c6ef01d4770efe1aa94da68e9a336bd1987b21402ae67ebaa5ef1f8a533d1a10f319f798f2b9b42add15a3b9c70c96416f47f21999ce1c6e00b0385d57d3018ef4ae72e762014104506dd1126823c65a3cda0072be84fd2e82c27f241770ccd147a5715a8c4f477e6d1441a4f3f0b", @generic="130aa02b98e86321d59060fbd544f835cc1e71176e5009465dc39652cdefc895e9a15730849edcb8908474a3a36554453efaf65859fe0894ad1b2749573141faefe01e7bf989ffd615181cb054c412abee22b32f069345a6ad2f7ef9b66f05cdcf209a3177a1ecf15ba451961b41951e282c8b5ab70c64724bb12885987a7276cb9e97c3e6a6ff85837fb0fee04a23c0544ce7fe0fefb4ea14f55585", @generic="5cbdc9f934108fe4b34c6bc8c7e88490c374556739e48a8db4ee963e42b2841a10b83dbd25f9b9c2fa2649d378aa", @typed={0x8, 0x91, 0x0, 0x0, @u32=0x8d}]}, 0x4a4}, 0x1, 0x0, 0x0, 0x8d4}, 0x90) r8 = syz_genetlink_get_family_id$batadv(0x0, r6) sendmsg$BATADV_CMD_GET_ORIGINATORS(0xffffffffffffffff, &(0x7f0000001400)={&(0x7f0000001340), 0xc, &(0x7f00000013c0)={&(0x7f00000008c0)=ANY=[@ANYBLOB=',\x00\x00\x00', @ANYRES16=r8, @ANYBLOB="010025bd7000e0dbdf250800000005000300000005002900010000001555716c29295db2179f285253bc12880a0a2deee1105615fc2a511db8a649480ba60578681032bdca92a7c69d9b95bf893026b6682e4c61c5b215449fdc505fa5103c5b28d3d3430fea51d8f7e8666ab3ce409a"], 0x2c}, 0x1, 0x0, 0x0, 0x4051}, 0x4824) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r3, &(0x7f0000000300)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x1c, r8, 0x100, 0x70bd2a, 0x25dfdbfd, {}, [@BATADV_ATTR_DISTRIBUTED_ARP_TABLE_ENABLED={0x5}]}, 0x1c}, 0x1, 0x0, 0x0, 0x905}, 0x20000000) 03:14:56 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x3340}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2490}, {r2, 0x11008}], 0x5, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x5]}, 0x8) 03:14:56 executing program 2: r0 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) fsmount(r0, 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r0, 0x7, 0x0, 0x0, 0x0) 03:14:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:56 executing program 0: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001240)='/proc/sysvipc/sem\x00', 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQES(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x12, r1, 0x10000000) r2 = perf_event_open$cgroup(&(0x7f00000000c0)={0x4, 0x80, 0x80, 0x3, 0xe0, 0x1, 0x0, 0x7fffffff, 0x28000, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x8001, 0xfff00000000000}, 0x2c09, 0x9, 0x20, 0x3, 0x6, 0x10000, 0x8bba, 0x0, 0x0, 0x0, 0x7}, r1, 0x2, r0, 0x1) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x0, 0x40, 0x4, 0x7f, 0x0, 0x2, 0x4, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2c5d, 0x0, @perf_bp={&(0x7f0000000000), 0x4}, 0x18, 0xfffffffffffffffa, 0x80, 0x9, 0x3ff, 0x2ac, 0x7ff, 0x0, 0x401, 0x0, 0x7fff}, 0xffffffffffffffff, 0x2, r2, 0x1) 03:14:56 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:14:56 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x3340}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2490}, {r2, 0x11008}], 0x5, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x5]}, 0x8) 03:14:56 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x14031}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000000080), 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x0, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1}, 0x7) ioctl$SG_IO(r0, 0x2285, &(0x7f00000002c0)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000000)="28138e98111b", 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000140)=0x0) ioctl$TIOCGETD(0xffffffffffffffff, 0x5424, &(0x7f00000001c0)) r2 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000180), 0x80000, 0x0) perf_event_open(&(0x7f00000000c0)={0x4, 0x80, 0x30, 0x0, 0x0, 0xf7, 0x0, 0x8, 0x10900, 0x4, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0xc582ff7f00defc49, @perf_config_ext={0x4, 0x2}, 0x0, 0x5, 0x18000, 0x6, 0x2, 0x101, 0x7f, 0x0, 0x1000, 0x0, 0x7}, r1, 0x1, r2, 0x0) 03:14:56 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x8, 0xffff}) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_none}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@seclabel}]}}) fcntl$getown(0xffffffffffffffff, 0x9) r2 = fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="400300001400010000000200040000000a00000008000000", @ANYBLOB="1d0001"], 0x340}}, 0x0) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000080), &(0x7f00000001c0)=0x4) 03:14:56 executing program 2: r0 = open(&(0x7f0000000000)='./file1\x00', 0x600000, 0x1b2) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}}, 0x0, 0xffffffffffffffff, r0, 0x0) lseek(r1, 0x0, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0x9d6786ab53c68cdb, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, 0x1c) fallocate(r1, 0x3, 0x52, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x5f42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x6, 0x12, r3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x950) dup2(r2, 0xffffffffffffffff) syz_open_dev$vcsa(&(0x7f0000000840), 0x401, 0x28180) ioctl$EXT4_IOC_GETSTATE(0xffffffffffffffff, 0x40046629, &(0x7f0000000200)) openat(r3, &(0x7f0000000240)='./file1\x00', 0x505200, 0x0) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) pwrite64(r4, &(0x7f00000000c0)="041a3a4985d424bdce9675f286982a09f7fe7569cb2c6e71f89e8019678c585aa70cc9e2435235dcb0b3434020d0f4d5613bb8bde96608eaf4af1834720900b040007af6d3edc14cd7ab81c733b614b0835ac6af8173be3b00015a826f2562ae98feb0d40000f80000", 0xff69, 0x3ff03) 03:14:56 executing program 4: r0 = creat(&(0x7f0000000000)='./file0\x00', 0x0) pread64(0xffffffffffffffff, &(0x7f00000005c0)=""/52, 0x34, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000080)='schedstat\x00') munmap(&(0x7f0000ff5000/0xb000)=nil, 0xb000) r1 = mmap$IORING_OFF_SQES(&(0x7f0000ff9000/0x4000)=nil, 0x4000, 0x1000000, 0x10010, 0xffffffffffffffff, 0x10000000) io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, r1, &(0x7f00000000c0)=@IORING_OP_POLL_ADD={0x6, 0x2, 0x0, @fd_index=0x1f, 0x0, 0x0, 0x0, {0x204}}, 0x9) r2 = openat(0xffffffffffffff9c, &(0x7f0000000440)='./file0\x00', 0x4c000, 0x0) io_setup(0x3, &(0x7f00000001c0)=0x0) readv(0xffffffffffffffff, &(0x7f0000001540), 0x0) r4 = syz_open_dev$tty1(0xc, 0x4, 0x1) r5 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$KDFONTOP_SET(r5, 0x541b, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) io_submit(r3, 0x6, &(0x7f0000000640)=[&(0x7f0000000180)={0x0, 0x0, 0x5, 0x1, 0x4, r2, &(0x7f0000000040)='\x00', 0x1}, 0x0, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x3, r2, &(0x7f0000000240)="486e3179ff053fa213836a3de97e02fc60b90db4a4f529d351a017880bf850aa6d3d5dd76aa8c102cf640c54bbf02a5538e2e58a8d93138aebd53f423d37f8bf1c52350ac99c49edd5b206cc12c778eacaf28a95c97f4c4a2a81", 0x5a, 0x4, 0x0, 0x3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x5, 0x8, r4, &(0x7f0000000300)="b7f97125f2df0f3eb3cf9bcf3a28193ea9c3ae8a0f3a6cb469b0db9f8ec6bbc95fc4a853c6a8471ea1d71890d2913601a6a92588fe18bdbb1483eda63688a4e0bc0ff858788183811d385872e670f6bf9083638ec1d04e5f84c96dc555ef01c28ca01059d3256a07eca06261ed1e50d9b3dc0951a32d07eb4d4d56d942d438f6135939d2eed5ff67cc227d4b3c51eec5bd42cd610a1c8f4fde4c44cbc3d1222223f6fe50caa15fb5b8c8b87039e0bfdec7a4735e9c198e4bb1f0b5ba39dbb4e1abf42d5e67020a6f6e062c1f8a20406d5700623a031e27e612ed6b7c50", 0xdd, 0x7}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0x1, r5, &(0x7f0000000480)="aa309c58b056d45e2a2834932b5eba4ad50ab826c34189041508a71554d4c9cd346a7c0b6dbcd875ee69a9daeb504dff986f3507eb9a8c5e9875e1f854539e4f2af25de3230cf09d555be36779f041ac66d3c034178673f9dd58d9", 0x5b, 0x100000001, 0x0, 0x2, r0}, &(0x7f0000000600)={0x0, 0x0, 0x0, 0x2, 0x400, r4, 0x0, 0x0, 0x4, 0x0, 0x1, r2}]) msync(&(0x7f0000ff6000/0x3000)=nil, 0x3000, 0x1) perf_event_open(0x0, 0x0, 0xb, r2, 0x0) ioctl$TIOCVHANGUP(r2, 0x5437, 0x0) 03:14:56 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, 0x0, 0x8, &(0x7f00000003c0)) [ 484.209960] 9pnet: Insufficient options for proto=fd [ 484.690794] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 484.692234] ext4 filesystem being mounted at /syzkaller-testdir376460658/syzkaller.FLXysr/50/file0 supports timestamps until 2038 (0x7fffffff) 03:15:10 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"]) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) preadv(r2, 0x0, 0x0, 0x61bf, 0x2) flock(r2, 0x6) socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="300000001c00b163009e00000014000100fc020000000000000000000000000000000000000000000400000000000000"], 0x30}}, 0x0) fcntl$dupfd(r1, 0x0, 0xffffffffffffffff) unshare(0x48020200) 03:15:10 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x8, 0xffff}) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_none}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@seclabel}]}}) fcntl$getown(0xffffffffffffffff, 0x9) r2 = fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="400300001400010000000200040000000a00000008000000", @ANYBLOB="1d0001"], 0x340}}, 0x0) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000080), &(0x7f00000001c0)=0x4) 03:15:10 executing program 6: sendmsg$802154_raw(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000180)={0x24, @none={0x0, 0x2}}, 0x14, &(0x7f00000001c0)={&(0x7f00000002c0)="18ff151661f4c0fe55f2902ed49bb276b1a89cfe95478915cb567ce0667ee26b81cdfa7fcdf61cca43e743cb085fe0ffa4ae901b3afb69bc4c4e18dedb0f631dcd", 0x41}, 0x1, 0x0, 0x0, 0x4}, 0x11) r0 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() ioprio_get$pid(0x3, r1) fcntl$setstatus(r0, 0x4, 0x75f3d7ae72e8c575) r2 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x7, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000000000004000000000002000020000020000000def4655fdef4655f0100ffff53ef010001000000ddf4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000e58ca12e13a240e2b1a22f8d07e8e55f010040", 0x1f, 0x4e0}, {&(0x7f0000010200)="010000000000050040", 0x9, 0x560}, {&(0x7f0000010300)="030000000400000005", 0x9, 0x800}, {0x0, 0x0, 0x1000000000c00}, {&(0x7f0000010d00)="ed41000000040000ddf4655fdef4655fdef4655f000000000000040020", 0x1d, 0x1480}, {&(0x7f0000012000)="504d4d00504d4dff", 0x8, 0x10000}], 0x0, &(0x7f0000012b00)=ANY=[]) getpeername(0xffffffffffffffff, &(0x7f0000000380)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @loopback}}}, &(0x7f00000000c0)=0x80) pread64(r3, &(0x7f0000000400)=""/254, 0xfe, 0x9) sendmsg$inet(r3, &(0x7f0000000700)={&(0x7f0000000140)={0x2, 0x4e20, @multicast1}, 0x10, &(0x7f00000006c0)=[{&(0x7f0000000500)="367457e576501aa379b3f10d5aa5512dd049f7dfb7a4c93be1fb004b48b0c48542e49682599eb18f8465e6", 0x2b}, {&(0x7f0000000540)="8634e0d8483a1333b71618523b71603f05d802c45e844ea84d6a218b4570071c31943e89f98a2a36ebdfea35aa795abc0c6838c6d18669fb911cfdb8ba03662d60911f536f42465067fbe562aaea1ba7f1d19c3333ad69f4ee7e", 0x5a}, {&(0x7f00000005c0)="1ec451ac180948328bf3d3cf5423a25aa2363a38290ef1251608a73557f48bbe67fada6548715d2698cbce758e4bf363904b89a24381d750db94386d1304201dc79ded7222b5135b457a4474d0b15fb3", 0x50}, {&(0x7f0000000640)="1aa2aa1cc7edee4b51a43a012a95c5faece6b7ec536e68eba2f0ad7a6d318cbfde2b7a65e7ff53b9d4f002538adacbcddca1e1199a638ea46e3e8bc3f046c746b3af4d109a4313ecabb48f28e5680ffecbbdc0db57e6c544", 0x58}], 0x4}, 0x40000) getsockopt$IP_SET_OP_GET_BYINDEX(0xffffffffffffffff, 0x1, 0x53, &(0x7f0000000040)={0x7, 0x7, 0x2}, &(0x7f0000000080)=0x28) ioctl$PERF_EVENT_IOC_RESET(r0, 0x2403, 0x4) r4 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000740), 0x80, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000780)=@IORING_OP_TEE={0x21, 0x4, 0x0, @fd=r2, 0x0, 0x0, 0x6, 0xa, 0x1, {0x0, 0x0, r4}}, 0x8) 03:15:10 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000003c0)) 03:15:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:10 executing program 7: r0 = socket$unix(0x1, 0x5, 0x0) listen(r0, 0x0) accept4(r0, 0x0, 0x0, 0x0) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r2 = socket$nl_generic(0x10, 0x3, 0x10) dup2(r1, r0) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x94, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x5}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000080)='ns\x00') getdents(r3, &(0x7f0000000400)=""/143, 0x8f) r4 = socket$unix(0x1, 0x5, 0x0) socket$inet_udp(0x2, 0x2, 0x0) connect$unix(r4, &(0x7f0000000140)=@file={0x1, './file0\x00'}, 0x6e) r5 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040), 0x2, 0x0) recvmmsg(r2, &(0x7f0000004140)=[{{&(0x7f00000001c0)=@xdp, 0x80, &(0x7f0000001500)=[{&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000100)=""/32, 0x20}, {&(0x7f00000004c0)=""/4096, 0x1000}, {&(0x7f0000000340)=""/8, 0x8}, {&(0x7f0000000380)=""/85, 0x55}, {&(0x7f00000014c0)}], 0x6, &(0x7f0000001580)=""/110, 0x6e}, 0x3f}, {{&(0x7f0000001600)=@ethernet={0x0, @dev}, 0x80, &(0x7f0000001800)=[{&(0x7f0000001680)=""/104, 0x68}, {&(0x7f0000001700)=""/240, 0xf0}], 0x2, &(0x7f0000001840)=""/122, 0x7a}, 0xc285}, {{&(0x7f00000018c0)=@phonet, 0x80, &(0x7f0000001d00)=[{&(0x7f0000001e00)=""/4096, 0x1000}, {&(0x7f0000001940)=""/239, 0xef}, {&(0x7f0000001a40)=""/16, 0x10}, {&(0x7f0000001a80)=""/244, 0xf4}, {&(0x7f0000001b80)=""/119, 0x77}, {&(0x7f0000001c00)=""/170, 0xaa}, {&(0x7f0000001cc0)=""/10, 0xa}, {&(0x7f0000002e00)=""/4096, 0x1000}], 0x8, &(0x7f0000003e00)=""/241, 0xf1}, 0x10000}, {{&(0x7f0000003f00)=@xdp, 0x80, &(0x7f0000004000)=[{&(0x7f0000003f80)=""/86, 0x56}], 0x1, &(0x7f0000004040)=""/74, 0x4a}, 0x8}, {{0x0, 0x0, &(0x7f0000004100)=[{&(0x7f00000040c0)=""/8, 0x8}], 0x1}, 0x3}], 0x5, 0x10130, &(0x7f0000004280)={0x77359400}) ioctl$FIONCLEX(r5, 0x5450) 03:15:10 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) ppoll(&(0x7f0000000100)=[{0xffffffffffffffff, 0x4}, {0xffffffffffffffff, 0x3340}, {0xffffffffffffffff, 0x20}, {0xffffffffffffffff, 0x2490}, {r2, 0x11008}], 0x5, &(0x7f0000000180)={0x0, 0x989680}, &(0x7f00000001c0)={[0x5]}, 0x8) 03:15:10 executing program 4: r0 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x1e, 0xe21}, 0x14}}, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f0000000080), 0x4) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000180)={0x0, 0x0, 0xffffffffffffffff, 0x81}) getsockname$netlink(r2, &(0x7f0000000100), &(0x7f0000000180)=0xc) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) bind$inet6(r3, &(0x7f00000000c0)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r0, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) bind$inet6(r3, &(0x7f0000000200)={0xa, 0x4e21, 0x6, @mcast2, 0xdc6}, 0x1c) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2048100}, 0xc, &(0x7f00000003c0)={&(0x7f0000000380)=@getspdinfo={0x14, 0x25, 0x300, 0x70bd29, 0x25dfdbff, 0x0, ["", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x4000004}, 0x4001) connect$inet6(r3, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmsg$inet6(r3, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000540)=[{&(0x7f00000001c0)="29719ea84f4503ceb5fcf5ea0549f4ae77ab00abd023edee71c45435000086c5813ebf7039", 0x25}], 0x1}, 0x10044001) r4 = fork() setsockopt$inet6_tcp_int(r3, 0x6, 0x19, &(0x7f0000000140)=0x400, 0x4) ptrace$setopts(0x4200, r4, 0x9, 0x0) ioctl$sock_SIOCSPGRP(r3, 0x8902, &(0x7f0000000040)=r4) accept$packet(r2, &(0x7f00000004c0)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000500)=0x14) 03:15:10 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000003c0)) 03:15:10 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0xe2a8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x5, 0x0) bind$unix(r0, &(0x7f0000000100)=@abs={0x1}, 0x6e) bind$unix(r0, &(0x7f0000000080)=@file={0x1, './file0\x00'}, 0x6e) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000001740)) [ 498.580555] 9pnet: Insufficient options for proto=fd 03:15:10 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:10 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x8, 0xffff}) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_none}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@seclabel}]}}) fcntl$getown(0xffffffffffffffff, 0x9) r2 = fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="400300001400010000000200040000000a00000008000000", @ANYBLOB="1d0001"], 0x340}}, 0x0) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000080), &(0x7f00000001c0)=0x4) 03:15:10 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:10 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x0, &(0x7f00000003c0)) [ 498.803340] 9pnet: Insufficient options for proto=fd [ 498.959578] EXT4-fs (loop6): mounted filesystem without journal. Opts: ,errors=continue [ 498.963434] ext4 filesystem being mounted at /syzkaller-testdir376460658/syzkaller.FLXysr/51/file0 supports timestamps until 2038 (0x7fffffff) 03:15:25 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:25 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) r1 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f00000000c0)={'ipvlan0\x00'}) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="2c10000010000100000000000000000000000000050000000000000010100080080011"], 0x102c}}, 0x0) 03:15:25 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)={0x20, 0x52, 0xc21, 0x0, 0x0, {0x2}, [@typed={0xc, 0x1, 0x0, 0x0, @u64=0x2}]}, 0x20}}, 0x0) r1 = dup(r0) ioctl$sock_ipv6_tunnel_SIOCADDTUNNEL(0xffffffffffffffff, 0x89f1, &(0x7f00000000c0)={'sit0\x00', &(0x7f0000000040)={'syztnl1\x00', 0x0, 0x29, 0x6, 0x0, 0x1000, 0x16, @private1={0xfc, 0x1, '\x00', 0x1}, @private2, 0x20, 0x10, 0x0, 0xfffffffd}}) sendmsg$ETHTOOL_MSG_LINKSTATE_GET(r1, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f0000000100)={&(0x7f00000002c0)={0xd4, 0x0, 0x300, 0x70bd28, 0x25dfdbfb, {}, [@HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth1_macvtap\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'rose0\x00'}]}, @HEADER={0x48, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'netpci0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'xfrm0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'macvlan0\x00'}]}, @HEADER={0x30, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ipvlan1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}]}]}, 0xd4}, 0x1, 0x0, 0x0, 0x10}, 0x4) 03:15:25 executing program 0: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='mountinfo\x00') readv(r0, &(0x7f0000000280)=[{&(0x7f0000001e00)=""/4098, 0x1002}], 0x1) ioctl$F2FS_IOC_FLUSH_DEVICE(r0, 0x4008f50a, &(0x7f0000000000)={0x8, 0xffff}) syz_mount_image$vfat(0x0, &(0x7f0000000240)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000004c0)='/proc/timer_list\x00', 0x0, 0x0) fsconfig$FSCONFIG_CMD_RECONFIGURE(r1, 0x7, 0x0, 0x0, 0x0) clone3(&(0x7f00000008c0)={0x1040100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) mount$9p_fd(0x0, &(0x7f0000000040)='./file1\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000140)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@cache_mmap}, {@cache_none}], [{@smackfsfloor={'smackfsfloor', 0x3d, ':'}}, {@seclabel}]}}) fcntl$getown(0xffffffffffffffff, 0x9) r2 = fsmount(r1, 0x0, 0x70) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="400300001400010000000200040000000a00000008000000", @ANYBLOB="1d0001"], 0x340}}, 0x0) getsockopt$WPAN_WANTLQI(r2, 0x0, 0x3, &(0x7f0000000080), &(0x7f00000001c0)=0x4) 03:15:25 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) 03:15:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:25 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, 0x0) 03:15:25 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 513.275849] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6795 comm=syz-executor.2 [ 513.280750] SELinux: unrecognized netlink message: protocol=0 nlmsg_type=0 sclass=netlink_route_socket pid=6808 comm=syz-executor.2 03:15:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, 0x0, 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:25 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, 0x0) [ 513.343043] netlink: 'syz-executor.7': attribute type 17 has an invalid length. [ 513.343907] netlink: 4100 bytes leftover after parsing attributes in process `syz-executor.7'. 03:15:25 executing program 2: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x14bf46, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c00, 0x0) ioctl$LOOP_SET_STATUS(r0, 0x4c02, &(0x7f0000000440)={0x0, {}, 0x0, {}, 0x4, 0x0, 0x0, 0x0, "2f6462cd75c5cac04b6da8ad054d68e070f74de6c5b5429810e1ffef8c3c9e453bce75c5c151b6767ae2cd0425b9198820f7ade3cf468f56547a2ab9696622b4", "1c4507b67d22ae80e9c947ffe2ec953a18ab4d5e704f797fffb0d3c02f20f145", [0x5, 0x1]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$F2FS_IOC_COMMIT_ATOMIC_WRITE(r1, 0xf502, 0x0) [ 513.357554] 9pnet: Insufficient options for proto=fd [ 513.406888] netlink: 'syz-executor.7': attribute type 17 has an invalid length. 03:15:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, 0x0, 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 513.407990] netlink: 4100 bytes leftover after parsing attributes in process `syz-executor.7'. 03:15:25 executing program 6: recvmmsg$unix(0xffffffffffffffff, &(0x7f0000001880)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000140)=""/157, 0x9d}, {&(0x7f0000000200)=""/106, 0x6a}, {&(0x7f0000000280)=""/73, 0x49}, {&(0x7f0000000300)=""/97, 0x61}, {&(0x7f0000000380)=""/113, 0x71}, {&(0x7f0000000400)=""/70, 0x46}, {&(0x7f0000000480)=""/234, 0xea}], 0x7, &(0x7f0000000600)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb0}}, {{&(0x7f00000006c0), 0x6e, &(0x7f0000000980)=[{&(0x7f00000000c0)=""/60, 0x3c}, {&(0x7f0000000740)=""/111, 0x6f}, {&(0x7f00000007c0)=""/156, 0x9c}, {&(0x7f0000000880)=""/231, 0xe7}], 0x4}}, {{&(0x7f00000009c0), 0x6e, &(0x7f0000001000)=[{&(0x7f0000000a40)=""/241, 0xf1}, {&(0x7f0000000b40)=""/188, 0xbc}, {&(0x7f0000000c00)=""/181, 0xb5}, {&(0x7f0000000cc0)=""/33, 0x21}, {&(0x7f0000000d00)=""/201, 0xc9}, {&(0x7f0000000e00)=""/160, 0xa0}, {&(0x7f0000000ec0)=""/19, 0x13}, {&(0x7f0000000f00)=""/197, 0xc5}], 0x8, &(0x7f0000001080)=[@cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x150}}, {{0x0, 0x0, &(0x7f0000001300)=[{&(0x7f0000001200)=""/213, 0xd5}], 0x1, &(0x7f0000001340)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xd8}}, {{&(0x7f0000001440)=@abs, 0x6e, &(0x7f0000001780)=[{&(0x7f00000014c0)=""/212, 0xd4}, {&(0x7f00000015c0)=""/176, 0xb0}, {&(0x7f0000001680)=""/12, 0xc}, {&(0x7f00000016c0)=""/178, 0xb2}], 0x4, &(0x7f00000017c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xa8}}], 0x5, 0x10040, &(0x7f00000019c0)={0x0, 0x989680}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x3, 0x0, 0x0, 0xfffffffc}, r1, 0x0, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000001c80)='./file1\x00', 0x105142, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = dup2(r3, r2) ioctl$FIGETBSZ(r0, 0x2, &(0x7f0000001a00)) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) sendfile(r5, r4, 0x0, 0x7ffffff9) 03:15:25 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, 0x0) 03:15:25 executing program 0: r0 = syz_io_uring_setup(0x4d7f, &(0x7f0000000080)={0x0, 0xde80, 0x0, 0x1}, &(0x7f0000ff5000/0x3000)=nil, &(0x7f0000ff5000/0x4000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000140)=0x0) r3 = openat$full(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd=r3}, 0x0) close(r3) signalfd4(0xffffffffffffffff, &(0x7f00000002c0), 0x8, 0x0) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) r4 = syz_open_dev$mouse(&(0x7f0000000100), 0x4, 0x500140) syz_io_uring_setup(0x6eb8, &(0x7f0000000180)={0x0, 0x35e8, 0x8, 0x2, 0x369, 0x0, r4}, &(0x7f0000ff7000/0x1000)=nil, &(0x7f0000ff5000/0x2000)=nil, &(0x7f0000000240), &(0x7f0000000280)) 03:15:25 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet(r2, &(0x7f0000002040)=[{{&(0x7f0000000380)={0x2, 0x0, @multicast1}, 0x10, &(0x7f0000001600)=[{&(0x7f00000003c0)="db9c", 0xffe7}], 0x1, &(0x7f00000000c0)=ANY=[@ANYBLOB="14000c00000000000000000007000000c4040701000000001c000000000000aced9c6d5e833b8700d45d6783649c42", @ANYRES32], 0x38}}], 0x1, 0x0) 03:15:25 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f00000000c0), 0x501480, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f0000000240)) r3 = creat(&(0x7f0000000040)='./file0\x00', 0x0) write$binfmt_elf64(r3, &(0x7f00000008c0)=ANY=[], 0x629) r4 = creat(&(0x7f0000000080)='./file0\x00', 0x0) openat(r3, &(0x7f0000000000)='./file0\x00', 0x200000, 0x144) pwrite64(r4, &(0x7f0000000100)="b55ebe9a6e5db556dca57af47a1c73476bda95182bc766924c6d5273e0a0726aa8bbf3278da8e92cc8cee0552825a3fecc175539d218b7253ca6c454b53b9822ee121b88317857ab899d052728dfc912147337738a7bfb60c79f6d04e6ce45030e6bb570cca2a3f75593b69c1d3f4e3a3ab2503c27a5539d1d8db9310b4c49d2d4891f98595e20d1b50f166ae48dee002054bff77896", 0x96, 0x3ff03) sendfile(r3, r0, 0x0, 0xffffffff000) 03:15:25 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(0xffffffffffffffff, 0x42, 0x0, 0x0) dup2(r1, r0) syz_open_procfs(0x0, 0x0) pipe(0x0) pipe(&(0x7f00000000c0)={0xffffffffffffffff}) splice(r2, 0x0, 0xffffffffffffffff, 0x0, 0x5, 0x0) ioctl$RTC_AIE_ON(0xffffffffffffffff, 0x7001) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) r3 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x10, r0, 0x10000000) syz_io_uring_submit(0x0, r3, 0x0, 0x0) perf_event_open(&(0x7f0000000040)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x10000, 0x0, @perf_bp={&(0x7f0000000140), 0x6}, 0x0, 0x0, 0x0, 0x0, 0x40000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0x9, 0xffffffffffffffff, 0x8) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, r5}) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3f, 0x81, 0x52, 0x1, 0x0, 0x7, 0x110, 0x9, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x4, 0x2000000000}, 0x8080, 0xf44a, 0x1f, 0x3, 0x100, 0x1, 0x40e, 0x0, 0xffffffff, 0x0, 0x800}, 0x0, 0x4, 0xffffffffffffffff, 0x3) sendfile(r0, r4, 0x0, 0x100000001) 03:15:25 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ftruncate(0xffffffffffffffff, 0x1000003) r0 = socket$inet(0x2, 0x1, 0x0) bind$inet(r0, &(0x7f0000000000)={0x2, 0x4e21, @multicast1}, 0x10) perf_event_open$cgroup(&(0x7f00000002c0)={0x6, 0x80, 0x2, 0x3, 0xfa, 0x6, 0x0, 0x7, 0x40010, 0x9, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x5, 0x957a}, 0x8000, 0x868, 0x4000000, 0x3, 0x0, 0x1, 0x6, 0x0, 0x4, 0x0, 0x7}, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x2) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000100)=ANY=[@ANYRES64, @ANYRES64, @ANYRES64=r0]) syz_init_net_socket$bt_l2cap(0x1f, 0x6, 0x0) epoll_ctl$EPOLL_CTL_MOD(0xffffffffffffffff, 0x3, 0xffffffffffffffff, &(0x7f0000000340)) r1 = syz_open_dev$mouse(&(0x7f0000000200), 0x10000, 0x40000) r2 = signalfd4(r1, &(0x7f0000000080), 0x8, 0x80000) ioctl$sock_inet_SIOCDARP(r2, 0x8953, &(0x7f0000000180)={{0x2, 0x4e24, @local}, {0x306, @remote}, 0x20, {0x2, 0x4e22, @initdev={0xac, 0x1e, 0x1, 0x0}}, 'vxcan1\x00'}) connect$inet(0xffffffffffffffff, &(0x7f0000000240)={0x2, 0x4e23, @loopback}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f00000000c0)={0x2, 0x4e21, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10) connect$inet(0xffffffffffffffff, &(0x7f0000000280)={0x2, 0x4e20, @remote}, 0x3a) connect$inet(r0, &(0x7f0000000140)={0x2, 0x4e21, @local}, 0x10) shutdown(r0, 0x1) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000000)={0x800005, 0x0, 0x8003, 0x0, 0xfffffffb}) ioctl$EVIOCGLED(0xffffffffffffffff, 0x80404519, &(0x7f0000000380)=""/130) openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x509940, 0x11) unshare(0x48020200) 03:15:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, 0x0, 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:38 executing program 6: perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(0xffffffffffffffff, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x882c2, 0x0) fallocate(r0, 0x10, 0x0, 0x1000002) setxattr$trusted_overlay_redirect(&(0x7f0000000080)='./file1\x00', &(0x7f0000000100), 0x0, 0x0, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)) getpeername$packet(0xffffffffffffffff, 0x0, 0x0) stat(&(0x7f0000000140)='.\x00', 0x0) utimensat(r0, 0x0, &(0x7f0000000200), 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f00000001c0)=0x2, 0xc3) r1 = openat$null(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) read(r1, 0x0, 0x0) syz_open_dev$vcsn(0x0, 0x0, 0x40000) open(&(0x7f0000000040)='./file0\x00', 0x1a18c1, 0x0) read(0xffffffffffffffff, 0x0, 0x0) 03:15:38 executing program 0: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) connect(r1, &(0x7f0000000040)=@pppol2tpv3={0x18, 0x1, {0x0, r0, {0x2, 0x4e20, @rand_addr=0x64010101}, 0x0, 0x0, 0x4, 0x1}}, 0x80) creat(&(0x7f00000000c0)='./file0\x00', 0x1a8) ioctl$LOOP_SET_STATUS(r0, 0x1261, 0x0) 03:15:38 executing program 7: ioctl$sock_inet_tcp_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f00000000c0)) pipe(0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x800, 0xceda1f6}, 0x0, 0x0, 0x1002, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet(0x2, 0x1, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f00000000c0)={0x0, {0x2, 0x0, @loopback=0x7f00000b}, {0x2, 0x0, @local}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x800}) r1 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) creat(&(0x7f0000000240)='./file0\x00', 0x49) r3 = perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x70, 0xff, 0x2, 0x0, 0x0, 0x1000000000, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000280), 0xa}, 0x8040, 0x0, 0x0, 0x5, 0x0, 0x82, 0x0, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000140)={@in={{0x2, 0x0, @remote}}, 0x0, 0x0, 0x4f, 0x0, "3c1c2fd629c4af55a8680f7a892e0865c7fbba0cdfa184016bc00618cdb5732d900802764f98b1af0cd43f34e89ab87a13a460acbb4433cb8a7aaa5797c2f5b5cc15058fbbef4c13daa3094bf3e22ec6"}, 0xd8) setsockopt$inet_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000040), 0x4) sendmmsg(0xffffffffffffffff, &(0x7f0000003bc0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB="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", @ANYRES32=r2], 0x10}}], 0x2, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) ioctl$BTRFS_IOC_QGROUP_ASSIGN(r3, 0x40189429, &(0x7f0000000080)={0x1, 0x5, 0x2}) fstatfs(r1, &(0x7f0000002e00)=""/4102) sendmsg$BATADV_CMD_GET_TRANSTABLE_GLOBAL(r1, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)=ANY=[@ANYRES16, @ANYRESHEX], 0x3c}, 0x1, 0x0, 0x0, 0x4001800}, 0x4801) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, &(0x7f00000002c0)={0x2, 0xf4, 0xfffffffffffffff9}) ioctl$FITRIM(r4, 0xc0185879, &(0x7f00000000c0)={0x0, 0xfffefffffffffffd}) 03:15:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:38 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:15:38 executing program 4: msgget$private(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$packet_fanout(0xffffffffffffffff, 0x107, 0x12, &(0x7f0000000240)={0x0, 0x1}, 0x4) msgget$private(0x0, 0xc2) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) signalfd4(r4, &(0x7f0000000080)={[0x9]}, 0x8, 0x80000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x6, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44, 0x9}, 0x9030, 0xd0, 0x0, 0x0, 0xa72}, r1, 0x0, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x0) 03:15:38 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) (fail_nth: 1) 03:15:38 executing program 2: ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, &(0x7f0000000140)={0x3, 0x40, 0x6, 0x7, 0x5}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, 0x0, 0x2001, 0x0) pipe2(0x0, 0x80000) syz_emit_ethernet(0x5e, &(0x7f0000000180)=ANY=[@ANYBLOB="bbbbbbbbbbbbbbbbbbbbbbbb86dd6096151700283afffe880000000000000000000000000001ff0200000000000000000000000000018900907800000000fc000000000000000000000000000000fe800000000000000000000000000000ec07a5003451c30947c9969bbc839603fff53a71778859f8d26936b985406299e165614db4466267424209874b8e3644059dd1895cfb29eebb4fc294d5c2029b7f01c0dac345f6675c15e1789c2c50c9a42cda3baca64d7f231910d3c752d63116598f32c23f6335adcb444c8cfe2b3a93e019ccc4912ed4ea50102ef7b124e003948fb1b247af1bf853da3bf30f5708334df3136b7e24a4f4ad0e3ea6b2897c0bcd4b1afc3792ac362ac9ac077cd061821f274f921b3bb60971696abd4613176c1c6024e01eaadacc8084c486fe5e23b740257ba9e7181431c2d2aff849ba1fc902aa419192be4387e14eebf343498e3c0ed1745a0ff477574a9d89ea56ba5ea3938ad471b89d2fe53e2f3590c363bcd2389a9512429c0e446ebaee06"], 0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000035c0), 0xe6b02, 0x0) write$tun(r1, &(0x7f0000000400)={@val={0x0, 0x1a91b}, @val={0x1, 0x0, 0x5, 0x2, 0x5, 0xab52}, @llc={@llc={0xbc, 0x0, '^', "c61f96b01093abdb3d01496fbeda7118d7838511d3a14dcd3a42caac255dd5e4199fbd0b3321af8ffb71278800302967d7f09c9d9513c625ae6b944e3bfaa101cd6ced23d7f97cca4f6a759db5562e558a78e27780705a44a7982f38d84137ef72b5dee5753b5855369cea1d0f40ae78419798487f6c7dc0d25fb30eeed84ee1c9b826637de1221e732f1df450f1ff166e761210a0485347ea6ce3bf3eeb7e09b19b0f460431a19e5f862272e75f51027a7b6254"}}}, 0xc5) write$tun(r1, &(0x7f0000000300)={@void, @val={0x2, 0x80, 0x3ff, 0x0, 0x9, 0x8b9}, @llc={@snap={0xab, 0xab, "ec", 'j%o', 0x17, "31aa4541a7cf00ccc80d8a91a2e58c3f7009fa5d042551eaf36c3b9584c4363e4a7464a8ccb197cd03e4b759f6562ad4b8df711dc56bba32837dee88a26c8b9c6abf81d42836d36e7d442da86aabe401ee16a03b1a8121f478b69ec34f6caf709ae8b627d71e2c131094e5c4c85a9e0e1f228efffadc203669657d0f63086a949c4db03608f974d6b43f8470617a031e1c072e6866a70b86b719414d2ac1680768fb358ef7aa19b457bb129296e133133c00ede67a6334dca1ae7861384fd1bf1f45071aec48e70cea14265f"}}}, 0xde) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f00000001c0), 0xffffffffffffffff) sendmsg$SEG6_CMD_SETHMAC(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000002c0)={&(0x7f0000000200)={0x54, r2, 0x20, 0x70bd27, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x5}, @SEG6_ATTR_HMACKEYID={0x8}, @SEG6_ATTR_ALGID={0x5, 0x6, 0x1}, @SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x8}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x1, 0x1, 0x1]}, @SEG6_ATTR_SECRET={0x10, 0x4, [0x400, 0x5, 0x1]}]}, 0x54}, 0x1, 0x0, 0x0, 0x4010}, 0x4) sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000600)={&(0x7f0000000500)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f00000005c0)={&(0x7f0000000540)={0x44, r2, 0x200, 0x70bd2c, 0x25dfdbfc, {}, [@SEG6_ATTR_HMACKEYID={0x8, 0x3, 0x3}, @SEG6_ATTR_DST={0x14, 0x1, @dev={0xfe, 0x80, '\x00', 0x3c}}, @SEG6_ATTR_DST={0x14, 0x1, @remote}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x4005) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @private1}, 0x1c) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r3, 0xffffffffffffffff) r4 = syz_open_dev$mouse(&(0x7f0000000100), 0x7, 0x2a8000) fcntl$dupfd(r4, 0x406, r3) write$tun(r3, &(0x7f0000000040)={@void, @val={0x0, 0x4, 0x8, 0x5, 0x4, 0x200}, @llc={@llc={0x42, 0xdc, 'K', "3d82791199a50aac2ae8f6c8e2543f2d3df0724a04168676f241ac587ca09f01953b2380dbb268e60ff5ffa6353fee2c3aca8c3cbbca3012db70618bd52c3028568378be28797295cd86e37e3609bb32770a4778d246184e91c30a"}}}, 0x68) r5 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000000), 0x80, 0x0) ioctl$PTP_SYS_OFFSET_PRECISE(r5, 0xc0403d08, 0x0) 03:15:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:38 executing program 4: perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0xe8b82, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) lseek(r0, 0x0, 0x4) sendmmsg$inet6(0xffffffffffffffff, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0xc3) r1 = fsmount(0xffffffffffffffff, 0x0, 0x88) openat(r1, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0xc3) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r2, 0x6, 0x4, &(0x7f00000000c0), 0x4) 03:15:38 executing program 0: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x400000, 0xfffffffd, 0x0, 0x0, 0x5, "7700326effff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x22003, 0x0) ioctl$BTRFS_IOC_SYNC(0xffffffffffffffff, 0x9408, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000200), 0x9}, 0x840}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TIOCGSERIAL(0xffffffffffffffff, 0x541e, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000240)=""/40}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_NONCE(r0, 0x8010661b, &(0x7f0000000040)) flock(0xffffffffffffffff, 0xa) setsockopt$inet6_udp_int(r1, 0x11, 0x67, &(0x7f0000000140)=0x7f, 0x4) connect$inet6(r1, &(0x7f0000000100)={0xa, 0xfffe, 0x0, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x2}, 0x1c) connect$inet6(0xffffffffffffffff, &(0x7f0000000380)={0xa, 0x4e21, 0x329b2670, @mcast2, 0x1}, 0x1c) sendmsg$inet(r1, &(0x7f00000000c0)={&(0x7f0000000000)={0x2, 0x4e21, @local}, 0x10, 0x0}, 0x404c008) r2 = fcntl$dupfd(r1, 0x0, r1) sendmsg$inet6(r2, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000bc0)='+', 0x1fc0}], 0x1}, 0x0) ioctl$TUNSETCARRIER(r2, 0x400454e2, &(0x7f0000000180)) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) sendmmsg$inet6(r3, &(0x7f0000000ac0)=[{{0x0, 0x0, &(0x7f00000006c0)=[{&(0x7f00000003c0)="3b6b9e9e5b93828225e1aa533c5b42c8a540b9f8861eaefdedf4eac42164b66b81ff054058e3e1cac886dd1b9a7453e06d4ba02294974385b2ce896d1fb09c01f30fa6577fe3484051ebbd3f85778db86a97b17043b7807c3c41be9b57b24ec7bb852715a0739717e4f111cb225dc94ab2f05fbb2e44d992754e9bfd245c72", 0x7f}, {&(0x7f0000000440)="45c657a73cdae27699f528269f27dcbfc26c7d5a0ecd1d9ef1e3df6f7adf2dfbfa5dbc7f26b6edb76e95ef7ae3c29023e9f152f39d3be58ac8ea8c4e18dd7c75be2aea0a0256d71369ec01b4b593918f2fb227e502e5b869038688dd3d917d885095bcde19eb6b8c3712bf29331a4c60eec03e2faffe3ee96c27669fb65d2e31ef0eb9f35b01464a3574977e7d7d5a", 0x8f}, {&(0x7f0000000c00)="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", 0x1000}, {&(0x7f0000000500)="cf3da1c6d81e8efcbbd5d9c048eb534126a8f732d143e6e25771cc0fc4ddac5670f9e5498440b98f3cf9d21f8f559029f2172e38f627fa17403a88bec89726e835889c5464e5cd7777408e078ed091e3459587ed021aaea627208ddcea301a38f2b78fb1330960150e6a564039c9065394bea8f8aecb3fd901e367f31a75d64344536e75c899fb97ab29ccf09d30e59dadedf0eab4b09290d41a56ad9fe67631a60f3f5c31b9292603db27d9a0eb1988be09900251366b5a5be3b8fa5b77bda988ebab44224f39c5e9cc76ea7d25726fb2d860fbf7dd9e27148b49394737ea8e6f98ea0a276f478e4d5e5398a5303f4066", 0xf1}, {&(0x7f0000000600)="b5e64d4704fd3cf95c292e6249d3e14caca293bb223edb86b85bcc6f346ac3c00656522dbe984ac68bbb52ea8501805e4bae2a3d25b9b7588ab7f463b5e4452edc", 0x41}, {&(0x7f0000000680)="e6361e23d923816c55c6a88d18918cc605a227c58fb835e4cdf299eef95f3db42f388d02d94ab7880f82", 0x2a}, {&(0x7f0000001c00)="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", 0x1000}], 0x7, &(0x7f0000000740)=[@rthdr={{0x58, 0x29, 0x39, {0x11, 0x8, 0x0, 0x3, 0x0, [@private1={0xfc, 0x1, '\x00', 0x1}, @empty, @private0, @private1={0xfc, 0x1, '\x00', 0x1}]}}}], 0x58}}, {{&(0x7f00000007c0)={0xa, 0x4e20, 0x9, @dev={0xfe, 0x80, '\x00', 0x42}, 0x6a}, 0x1c, &(0x7f0000000980)=[{&(0x7f0000000800)="2a475cd78f229a181856e82665d5e166a311cfaaf5df3bd1095b4783b2d3cfb6cc62b64865e1af83da6542db0c8b2eea6c79ec81190baa476def6d887c4aafe65126469bc450ac8d79a49786418a68770c4222411c75ec0c6d2b591eac29cd07d12b81ad5e5a9fefc0973477cbc2d359c86dea7b7f62d12bdf36411c755fe14decb91052a398659d8f1fa9e10a346b594bb8056c9055c6fb7d7d8a4c10dcb290afb2934816da6d2054ff7bbfe91d865d77bfa3", 0xb3}, {&(0x7f00000008c0)="fba72d6a911e9a847f6a0f974aa5b9562c86d1baa54071e6f2b8d3ec90fab237a0fa3231a2178888f913723198bce9559bc1cc7d596cdaa5b6fad21c11d4bcf6d1aec8c8da14156309e301f3b49b71d163dbc42087b13592d5aec4491618e49f4fdb243f80d766ae32bea5e723632cbc42d18afa", 0x74}, {&(0x7f0000000940)="ebf4743fdac1ac71c28680cb722c", 0xe}], 0x3, &(0x7f00000009c0)=[@dontfrag={{0x14, 0x29, 0x3e, 0x7}}, @rthdrdstopts={{0x38, 0x29, 0x37, {0x5e, 0x3, '\x00', [@calipso={0x7, 0x18, {0x3, 0x4, 0x1, 0x7ff, [0x2c, 0x0]}}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x8}}, @dstopts={{0x20, 0x29, 0x37, {0x4, 0x1, '\x00', [@ra={0x5, 0x2, 0xfff8}, @ra]}}}, @tclass={{0x14, 0x29, 0x43, 0xffffffff}}, @dstopts_2292={{0x20, 0x29, 0x4, {0x2b, 0x0, '\x00', [@enc_lim={0x4, 0x1, 0x80}]}}}, @dontfrag={{0x14, 0x29, 0x3e, 0x5}}], 0xd8}}], 0x2, 0x4000000) 03:15:38 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:15:38 executing program 2: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0xa, &(0x7f0000000000)=0xfffffffd, 0x4) sendmmsg$inet6(r0, &(0x7f00000004c0)=[{{&(0x7f0000000080)={0xa, 0x4e22, 0x3, @empty, 0x2}, 0x1c, 0x0, 0xfffffffffffffea8}}], 0x1, 0x0) 03:15:38 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) getsockopt$ARPT_SO_GET_INFO(r0, 0x0, 0x60, &(0x7f0000000140)={'filter\x00', 0x0, [0xfffff4b7, 0xb6, 0x401]}, &(0x7f00000001c0)=0x44) sendmsg$nl_generic(r1, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)={&(0x7f00000002c0)={0x14, 0x42, 0xe21}, 0x14}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000000)=0x3) r2 = timerfd_create(0x0, 0x0) timerfd_settime(r2, 0x0, &(0x7f0000000240)={{0x77359400}, {0x0, 0x3938700}}, 0x0) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x100) timerfd_create(0x0, 0x0) r3 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup.cpu/syz0\x00', 0x200002, 0x0) fcntl$setpipe(r3, 0x407, 0x4) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r4, 0xffffffffffffffff) timerfd_gettime(r4, &(0x7f0000000080)) 03:15:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:38 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x2, 0xff, 0x9, 0x6, 0x0, 0xef, 0x10020, 0x4, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x2, @perf_config_ext={0x7, 0x71}, 0x12, 0x8000, 0x3, 0x1, 0x0, 0x8, 0x2, 0x0, 0xa2b80000, 0x0, 0x7}, 0xffffffffffffffff, 0x9, r0, 0x9) setsockopt$inet_pktinfo(r1, 0x0, 0x8, &(0x7f0000000040)={0x0, @loopback, @loopback}, 0xc) openat$sr(0xffffffffffffff9c, &(0x7f0000000200), 0x200080, 0x0) syz_open_dev$vcsu(&(0x7f0000000000), 0x4673, 0x41000) r2 = fcntl$dupfd(r0, 0x0, r1) lseek(r1, 0x800, 0x0) fsetxattr$trusted_overlay_nlink(r2, &(0x7f0000000080), &(0x7f00000000c0)={'L-', 0x8}, 0x16, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1920, 0x9, 0x400}, 0x0, 0x5, 0xffffffffffffffff, 0x0) r3 = openat(0xffffffffffffffff, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) 03:15:38 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:15:38 executing program 6: ioctl$BTRFS_IOC_QGROUP_ASSIGN(0xffffffffffffffff, 0x40189429, &(0x7f0000000500)={0x1, 0x80, 0x2}) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000540)=ANY=[@ANYBLOB="280000001000010000000000000000000000000005000000000000000c00008008000300", @ANYRES32, @ANYBLOB="79c877c729bbfd452777d2d6f2412954896dcdd64d04aff5f01bc9800091dc29542b23036965808c2bb8d00e2ca83143a7a97f0898f923f8b0a69360bb221419344eca249d6bf688086fc112e951d00e7543d493c38df421c2a8b80de37f559126acbe43246e6a26c042be7404420478f499f4659bd12afa70770877d2ac0db5feef81eabda646ccaf5491a1dbd46e9c93aa74964d4f5e0984036eafbef2e98bed33ab4e45a7ddd65b162dde285f7412d9d04739f26b850a5c258aa9bedf757b8b04a4243a836a0956a9f8e745c86a1da0dad9c0949f8f04550492ed3591760bbddb0637b484e276451fc34cab7aa8ef16b5"], 0x28}}, 0x0) dup2(r0, r0) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000000)='/sys/power/resume', 0x22902, 0x0) io_submit(0x0, 0x1, &(0x7f0000000200)=[&(0x7f0000000100)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000000c0)="9a", 0x1}]) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x5, 0x0) r4 = openat$null(0xffffffffffffff9c, &(0x7f0000000440), 0x1, 0x0) io_submit(0x0, 0x3, &(0x7f00000004c0)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x3, 0x6, r3, &(0x7f0000000180)="dc03f6f1c9a89561225e0c606f4ca8f5260e00636dff107a1284c65a479759413cdb50a33740f242a4c15289a288683a216931371da328c521862577683b56f5e6071f934e16b8056d0c8fdc43c1bed723ea79437a66a3085aa453fb27dd0053189316ea2aecc8ec49933c9dc46241b1c26711e3bf8cef00d746ec25386ba32e2ed22d9692a0b19963e55b7756c59de2d2811a28283f93ee3998", 0x9a, 0x3}, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0xffff, 0xffffffffffffffff, &(0x7f0000000240)="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", 0xfa, 0x7, 0x0, 0x2}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x0, 0x7, r1, &(0x7f0000000340)="623d0af000176a696facc0813752ec239913bf1206f58862347900bd02ee07d8a356ef5057ba5d6994fda83a796c90a5369c294e42c5d4804937a5f90d6270c2efaaefe8cd8c6de81b5f63f6db5e47781bbeec530083a312ac108dba272af2834086b7f06d3016781dbb324ea5a77e94b8ef11c24f8731cbf53d2ca1d1e4e4563f87fd9cf08ff6f6b3524ca588757d952f1c7e8e5f38f498da34f5c800909bad0e3453f66a6b108fdba43595a333ec8b43d8fb64be43dd35da3cbde62f4d8c2a92b3d1106eed354ed9659a14217e9875f76c483095676269bd8c5cb9608505afe8e22df04b7151ead219fcda6c6a04106d853434f44426aeab", 0xf9, 0x5, 0x0, 0x2, r4}]) r5 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_SIOCGIFVLAN_GET_VLAN_VID_CMD(r5, 0x8982, &(0x7f0000000680)) pread64(r1, &(0x7f0000000040)=""/22, 0x16, 0xff) 03:15:38 executing program 7: perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xa8}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fork() perf_event_open(0x0, 0x0, 0xfffffffffffffffb, 0xffffffffffffffff, 0x0) r0 = timerfd_create(0x9, 0x0) timerfd_settime(r0, 0x1, &(0x7f0000000040)={{0x77359400}, {0x0, 0x3938700}}, 0x0) timerfd_gettime(r0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sync() r1 = syz_mount_image$ext4(0x0, &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f00000007c0)='net/nfsfs\x00') dup2(r3, r2) r4 = pidfd_getfd(0xffffffffffffffff, r1, 0x0) renameat2(r3, &(0x7f0000000040)='./file0/file0\x00', r4, &(0x7f0000000080)='./file0\x00', 0x4) mount(0x0, &(0x7f00000004c0)='./file0\x00', &(0x7f0000000000)='cgroup2\x00', 0x0, 0x0) syz_mount_image$vfat(&(0x7f0000000380), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x1a318ed, &(0x7f0000000900)=ANY=[]) r5 = open(&(0x7f0000000180)='./file0\x00', 0x0, 0x0) mkdirat(r5, &(0x7f0000000200)='./file0\x00', 0x0) 03:15:38 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:38 executing program 2: syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f00000001c0)='ns/time\x00') r0 = getpid() r1 = getpgid(0x0) r2 = epoll_create(0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r4, 0x540a, 0x2) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000140)=ANY=[@ANYBLOB="01800000010000005084284d1a8382c7c5e41d6c2867b591180000", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./file0\x00']) kcmp$KCMP_EPOLL_TFD(r0, 0xffffffffffffffff, 0x7, r4, &(0x7f0000000100)={r5, r2, 0xfffffff8}) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x100000001) r8 = io_uring_setup(0x6e65, &(0x7f0000000200)={0x0, 0x65cc, 0x10, 0x0, 0x111}) epoll_ctl$EPOLL_CTL_MOD(r7, 0x3, r8, &(0x7f0000000180)={0x11}) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000040)={r2, r3}) syz_open_procfs$namespace(r1, &(0x7f0000000000)='ns/time_for_children\x00') [ 526.453330] mac80211_hwsim hwsim16 ÿÿÿÿ: renamed from wlan1 03:15:54 executing program 5: r0 = fork() ptrace(0x10, r0) ptrace$getregset(0x4204, r0, 0x1, &(0x7f0000000040)={&(0x7f0000000000)=""/44, 0x2c}) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:15:54 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private1}, 0x14) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0xffff}}, 0x14}, 0x1, 0x0, 0x0, 0x800c010}, 0x81) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[@ANYBLOB="20003dd800023c0000ffffd800000000000000080000000000f4ff0000000400"], 0x20}}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) 03:15:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000340)='./file1\x00', 0x543, 0x10) pwritev(r0, &(0x7f0000000780)=[{&(0x7f0000000100)="e6c5c11c292c9f56577fc75c1365dc3e9402451b8b9b15bc8eb05fa14bfc6e9c25", 0x21}, {&(0x7f0000000340)}, {&(0x7f0000000380)}, {&(0x7f00000003c0)="6e2529b90af167604e1f0c5898e0a845c1b4792fdc2616a0c36bd3fa3b63de66527e3315084d6c8d91730de48e1f3127a809e065d32605039def4eb0f94de9084aa30cd2865ab139026fc1678ccd4e6b97e40038061da1d53e21b4b4c28fd952b5da1152c5dd7e773ad131e71e1f3b73d38e8497a479e9e68a2382b974e46bc696b3c4a94bb7460ea86d22a47a0be830cc9bd67539a641a8d97527bd0ac095079b8cf752a71560ec", 0xa8}, {&(0x7f0000000480)="b41bf4ac9ad9c4a031f50c5a99e17fd076de0ed279ff719bce9132b9b6ee0ae97785d8f3925e33f0ddc134e1e72da1fd26570bafe6c4bef8f769a2168c76948f39bb96875cb36afc62d0c460d1adc7c947566eff51f6dafe0c51da6912e53e33a053f375b7253cf4dbb111f545be", 0x6e}, {&(0x7f0000000500)="1d81a446bb258271186d59dc87612400745e7f32", 0x14}, {&(0x7f0000000540)="6e0338b7c7cb5a3794e0d7a88a0b1d88f9755472c724affc418938acfb44a747426662d21cdc2116974737283867240b1b7380f8fe0519dc46849275ea1aee009d0de65d843fb21bcef4dc8516a470db8bb4664e3261be991b20ac7026d58e0e087f7f945066007a9586b4784629abc08e46f20e17e8639c9c243cdc7df90064fbde5af833d5f86a79450143ea838b5b428c2f4fbb302e5171fcf24f4385fd633e8fd6463d6a2332f2c59675f6a62ae745d10c9c6d8a0d77fd7b9a5cc9ced07a6f7987f2d4108ecc9bf9382f83c7e28f1f89044915b18e18a9505f8032dd73aadf2a", 0xe2}, {&(0x7f0000000640)="a3c516a1acd8c556876c27983450aeb0673e03434d92f4c8c5b0703f93ff331bf8b18ec456ccdd478f1482bead983bfde257f64c506e87072b571af7969b72e0294099958e29e11b216d615234cdc3203be97aaf78f07deaede054e8418920bb6ad81418a963f9c7694d0408eb7974eff74d96a9ee26042e1f85d5aeb2b969eb22b06f92690ab4bacae161946230b897c027680663d4200f2b29e3c7ace7c74c399c175f2cfe8e92580a5229d95dd2320406e08999817417790722ffbb7515dadfb2e8c65568b9e5f749a6aff5d6e5efaa8dc8adfdaec741927ca021ec12b575e2b2ca82be10a1f755c6232284da", 0xee}, {&(0x7f0000000740)="7e43e790a6d208486713852be39d2a958104f6b722d880a379423b12e4b693f98d3d9c7a9f6a24", 0x27}], 0x9, 0x9, 0xfc000000) lseek(r0, 0x4, 0x3) r1 = syz_open_dev$vcsa(&(0x7f0000000040), 0xffffffffffffff08, 0x800) io_uring_register$IORING_REGISTER_PROBE(r1, 0x8, &(0x7f0000000840)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000eb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000811328b7dcfe11eaecb8590dfd86d0b000000000000007e4b0224818d9a1ef2f8ca1505f8621124c7f7354c95b8d7bfb03e8c0d873436455747a4e6cd6616e29cf2a1e9a98059a8600f36e111e51fd5d4661e9718875493d6650aa8779878cd0972c68f8f740551262e8a264bf024234e6175f5f0ed520ae613fa2a9ed87f4feebf9a8e9bf8b9c1017c7d0d48dc92f888e8d3905594a3aa9fb57b9fcd59e6f301e907665d7d07b7d112592221b72c7f0232ef96104e71bd1bf66982c2e9c963dff4abc6468a012e2261d47e9c397c24e4818a61f07341ab0056cc231b76dc55eeab3c829df18b0a8f6c77ee521e36fd8dc44e"], 0x25) clone3(&(0x7f0000000180)={0x201a48100, 0x0, 0x0, 0x0, {0xfffffffc}, 0x0, 0x0, 0x0, 0x0, 0x0, {r0}}, 0x58) r2 = epoll_create1(0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file1\x00', &(0x7f0000000140), 0x0, &(0x7f00000000c0)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r2}}) 03:15:54 executing program 4: r0 = syz_mount_image$ext4(0x0, &(0x7f0000000040)='./file0\x00', 0x100, 0x0, 0x0, 0x0, 0x0) clock_gettime(0x0, &(0x7f00000000c0)={0x0, 0x0}) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) utimensat(r0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000140)={{r1, r2/1000+10000}, {r3, r4/1000+10000}}, 0x100) connect$inet6(0xffffffffffffffff, 0x0, 0x0) mknod(&(0x7f0000000000)='./file0\x00', 0x8c229d26fb7758d8, 0x401) 03:15:54 executing program 6: syz_io_uring_setup(0x7e21, &(0x7f0000000240), &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffd000/0x1000)=nil, &(0x7f00000002c0), &(0x7f0000000300)) openat$hpet(0xffffffffffffff9c, &(0x7f0000000580), 0x0, 0x0) 03:15:54 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:15:54 executing program 2: r0 = perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2025c, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe, 0x0, @perf_config_ext={0x0, 0x400}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) fstat(0xffffffffffffffff, &(0x7f0000000200)) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r2 = fcntl$dupfd(r0, 0x0, r1) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x14, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000002c0)='./file0/../file0\x00', &(0x7f0000000380)='ramfs\x00', 0x0, 0x0) ioctl$sock_TIOCOUTQ(0xffffffffffffffff, 0x5411, &(0x7f0000000000)) ioctl$TIOCSCTTY(r2, 0x540e, 0x2) mount$9p_unix(&(0x7f0000000040)='./file0/../file0\x00', &(0x7f0000000200)='./file0\x00', 0x0, 0x81000, &(0x7f00000003c0)=ANY=[]) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000180)={0x0, 0x5, 0x1, 0x0, 0x16, "0d526756fd940805ccbf7e4fbba743f0a077df"}) r4 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0), &(0x7f0000000140)=0xc) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)) 03:15:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:54 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:54 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x44e0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x20000000000000}, 0x0, 0x0, 0x0, 0x5, 0x0, 0x40000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000080)={0x0, 0xfdfdffff, 0x102, 0x0, '\x00', [{}, {0x800, 0x0, 0x400000000000000}], ['\x00']}) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0xc02, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) fcntl$dupfd(r2, 0x0, r2) close(0xffffffffffffffff) r3 = socket$netlink(0x10, 0x3, 0x0) r4 = fcntl$dupfd(r3, 0x406, 0xffffffffffffffff) lseek(r0, 0xd3, 0x3) sendmsg$nl_generic(r4, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000140)={0x30, 0x1c, 0xd38865185e4463b1, 0x0, 0x0, {}, [@typed={0x5, 0x0, 0x0, 0x0, @str='\x9e'}, @typed={0x14, 0x1, 0x0, 0x0, @ipv6=@private2}]}, 0x30}}, 0x3004c004) fcntl$dupfd(r2, 0x406, r4) unshare(0x48020200) unshare(0x0) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) r6 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000040), 0x1, 0x0) write(r6, &(0x7f0000000300)='E\x00', 0x2) fcntl$dupfd(r5, 0x0, r6) 03:15:54 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=@acquire={0x250, 0x17, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}}, @in=@local, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, r1}}, 0x0, 0x4}, [@algo_auth_trunc={0x126, 0x14, {{'sha384-ce\x00'}, 0x6d0, 0x180, "faa42a328de8bc9f415f5e16d11e92054ce16a6aea030a5ddc73b7519f28785bfb163b28a4880b6ed653a013d829055ed5c5bfab26806ad11722e12faee442b267607600e0ef56b3ec0f5c7c813be3f21674c2e5dcf80108a83e9d32df18d9e05f1eea953a85eb125ce27f42abae17b7ff7e75e7191e33f6a94ea7e4768c7312888a70db952b934349856e2571d3e458dcefe9eee31ae1d2a4e27f3850469b214ea46cebb32c19f3b794434e65dc8ed77f2521b8d3a2c01a6d1ed554a8497396ebd7dbac9d296536fbf65bf0533df3fc4b52e722c0d91c6e693f"}}]}, 0x250}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x98a) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$AUDIT_USER_TTY(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xfc, 0x464, 0x400, 0x70bd2a, 0x25dfdbff, "8e9226c74193b7b5b72b733726b6bb48808ba3cdd6a345917bdbb1c08f57e612c77a4b7928584e92dea2e5b7ebb9b2804343c2e8384e7cf254b37b1c8e621fc79ba4559b51921ea4411c09185e31369d8a3eb020edebbc0348e4075cdba7fea8f658f39ce65cdee4450b834dc20952bf9b749651fd317bb6696de86bd28d24a86eafb340e5a960905deefa5ed9e5d1cb850a4e9752c96c15d92eeb8d33cb9a5c84db452fe2036c5f0d76a83d2dd87362b5890c7a6c35cec7d2cf79352031d0f1b3e76e86b419244678ebd4629c0f554edbc78b1d57e507eb711b9188da004de886981b9fc4e8247b42", ["", "", "", "", "", "", ""]}, 0xfc}, 0x1, 0x0, 0x0, 0x20040}, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000080)={0x14, 0x22, 0x69844ea0a6ddcd11}, 0x14}}, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2]) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)) unshare(0x48020200) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), r2) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={0x2c, r6, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000c001}, 0x810) 03:15:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:15:54 executing program 5: ptrace(0x10, 0x0) waitid(0x0, 0x0, &(0x7f0000000600), 0x1, &(0x7f00000003c0)) r0 = getpid() r1 = getpgid(0x0) r2 = epoll_create(0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r0, r1, 0x7, r2, &(0x7f0000000040)={r2, r3}) waitid(0x0, r1, 0x0, 0x8, &(0x7f0000000000)) 03:15:54 executing program 5: creat(&(0x7f0000000140)='./file0\x00', 0x0) r0 = fork() ptrace(0x10, r0) sched_getattr(0xffffffffffffffff, &(0x7f0000000180)={0x38}, 0x38, 0x0) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x20000) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) waitid(0x2, r1, &(0x7f0000000600), 0x4, &(0x7f00000001c0)) ptrace$setsig(0x4203, r0, 0x7fffffff, &(0x7f0000000000)={0x2e, 0x1, 0x1}) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000080)={0x0, 0x0}) tkill(r5, 0x20) r6 = syz_io_uring_complete(0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r3, &(0x7f0000000100)={0xb0002000}) 03:16:11 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:11 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000400)) getegid() r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) openat(r1, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000140)=""/230, 0xe6}], 0x2, &(0x7f00000002c0)}, 0x10001) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xffff) fcntl$dupfd(r4, 0x0, r3) sendmsg$inet6(r3, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) pread64(r2, &(0x7f0000000480)=""/91, 0x5b, 0x8) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\a', 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) unshare(0x5a030a80) 03:16:11 executing program 4: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) stat(&(0x7f0000000240)='./file0\x00', &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$nl_xfrm(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000540)=@acquire={0x250, 0x17, 0x1, 0x0, 0x0, {{@in6=@private2={0xfc, 0x2, '\x00', 0x1}}, @in=@local, {@in6=@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @in6=@private0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0xffffffffffffffff}, {{@in6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02', @in=@loopback, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, r1}}, 0x0, 0x4}, [@algo_auth_trunc={0x126, 0x14, {{'sha384-ce\x00'}, 0x6d0, 0x180, "faa42a328de8bc9f415f5e16d11e92054ce16a6aea030a5ddc73b7519f28785bfb163b28a4880b6ed653a013d829055ed5c5bfab26806ad11722e12faee442b267607600e0ef56b3ec0f5c7c813be3f21674c2e5dcf80108a83e9d32df18d9e05f1eea953a85eb125ce27f42abae17b7ff7e75e7191e33f6a94ea7e4768c7312888a70db952b934349856e2571d3e458dcefe9eee31ae1d2a4e27f3850469b214ea46cebb32c19f3b794434e65dc8ed77f2521b8d3a2c01a6d1ed554a8497396ebd7dbac9d296536fbf65bf0533df3fc4b52e722c0d91c6e693f"}}]}, 0x250}}, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f00000001c0)=ANY=[@ANYRES64=r0], 0x98a) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) sendmsg$AUDIT_USER_TTY(r2, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000140)={&(0x7f0000000400)={0xfc, 0x464, 0x400, 0x70bd2a, 0x25dfdbff, "8e9226c74193b7b5b72b733726b6bb48808ba3cdd6a345917bdbb1c08f57e612c77a4b7928584e92dea2e5b7ebb9b2804343c2e8384e7cf254b37b1c8e621fc79ba4559b51921ea4411c09185e31369d8a3eb020edebbc0348e4075cdba7fea8f658f39ce65cdee4450b834dc20952bf9b749651fd317bb6696de86bd28d24a86eafb340e5a960905deefa5ed9e5d1cb850a4e9752c96c15d92eeb8d33cb9a5c84db452fe2036c5f0d76a83d2dd87362b5890c7a6c35cec7d2cf79352031d0f1b3e76e86b419244678ebd4629c0f554edbc78b1d57e507eb711b9188da004de886981b9fc4e8247b42", ["", "", "", "", "", "", ""]}, 0xfc}, 0x1, 0x0, 0x0, 0x20040}, 0x4) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f0000000080)={0x14, 0x22, 0x69844ea0a6ddcd11}, 0x14}}, 0x0) ioctl$FS_IOC_GETFSMAP(r3, 0xc0c0583b, &(0x7f0000000080)=ANY=[@ANYRESOCT=r2]) ioctl$sock_SIOCSPGRP(0xffffffffffffffff, 0x8902, &(0x7f0000000180)) unshare(0x48020200) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) r6 = syz_genetlink_get_family_id$batadv(&(0x7f0000000280), r2) sendmsg$BATADV_CMD_GET_BLA_CLAIM(r4, &(0x7f00000007c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000500)={&(0x7f0000000340)={0x2c, r6, 0x8, 0x70bd28, 0x25dfdbfd, {}, [@BATADV_ATTR_ORIG_INTERVAL={0x8, 0x39, 0x7}, @BATADV_ATTR_HOP_PENALTY={0x5, 0x35, 0x6}, @BATADV_ATTR_MULTICAST_FANOUT={0x8, 0x3c, 0x9}]}, 0x2c}, 0x1, 0x0, 0x0, 0x2000c001}, 0x810) 03:16:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:11 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private1}, 0x14) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0xffff}}, 0x14}, 0x1, 0x0, 0x0, 0x800c010}, 0x81) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[@ANYBLOB="20003dd800023c0000ffffd800000000000000080000000000f4ff0000000400"], 0x20}}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) 03:16:11 executing program 5: r0 = fork() ptrace(0x10, r0) wait4(r0, &(0x7f0000000200), 0x9, &(0x7f0000000240)) ptrace$getregset(0x4204, r0, 0x4, &(0x7f00000000c0)={&(0x7f0000000000)=""/137, 0x89}) waitid(0x2, 0x0, &(0x7f0000000600), 0x2, &(0x7f00000003c0)) wait4(r0, &(0x7f0000000100), 0x2, &(0x7f0000000140)) 03:16:11 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r1 = openat$nvram(0xffffffffffffff9c, 0x0, 0x40000, 0x0) utimensat(r1, &(0x7f0000000080)='./file1\x00', &(0x7f0000000140), 0x0) syz_io_uring_setup(0x0, 0x0, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000ffa000/0x4000)=nil, &(0x7f0000000240)=0x0, &(0x7f0000000280)=0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffffff, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r4, 0x0, 0x100000007) r5 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) r9 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) r10 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r10, 0x540a, 0x2) ioctl$TCSETSF(r10, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$AUTOFS_IOC_SETTIMEOUT(r10, 0x80049367, &(0x7f0000000180)=0x20) syz_io_uring_submit(r6, r7, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r8, 0x0, &(0x7f0000000500), 0x0, 0x0, 0x1, {0x0, r9}}, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_POLL_REMOVE={0x7, 0x1, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r9}}, 0x20) 03:16:11 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:16:11 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:11 executing program 5: prctl$PR_GET_NAME(0x10, &(0x7f0000000080)=""/121) r0 = fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) ptrace$getsig(0x4202, r1, 0xc, &(0x7f0000000140)) prctl$PR_GET_NAME(0x10, &(0x7f00000001c0)=""/220) ptrace(0x10, r0) getpgrp(r0) clock_gettime(0x0, &(0x7f0000005f80)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000005e00)=[{{&(0x7f0000000000)=@abs, 0x6e, &(0x7f0000001580)=[{&(0x7f00000002c0)=""/225, 0xe1}, {&(0x7f00000003c0)=""/142, 0x8e}, {&(0x7f0000000480)=""/242, 0xf2}, {&(0x7f0000000580)=""/4096, 0x1000}], 0x4}}, {{&(0x7f00000015c0), 0x6e, &(0x7f0000001880)=[{&(0x7f0000001640)=""/36, 0x24}, {&(0x7f0000001680)=""/208, 0xd0}, {&(0x7f0000001780)=""/244, 0xf4}], 0x3, &(0x7f00000018c0)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x78}}, {{&(0x7f0000001940), 0x6e, &(0x7f0000002100)=[{&(0x7f00000019c0)=""/171, 0xab}, {&(0x7f0000001a80)=""/92, 0x5c}, {&(0x7f0000001b00)=""/175, 0xaf}, {&(0x7f0000001bc0)=""/160, 0xa0}, {&(0x7f0000001c80)=""/147, 0x93}, {&(0x7f0000001d40)=""/138, 0x8a}, {&(0x7f0000001e00)=""/152, 0x98}, {&(0x7f0000001ec0)=""/136, 0x88}, {&(0x7f0000001f80)=""/229, 0xe5}, {&(0x7f0000002080)=""/102, 0x66}], 0xa}}, {{0x0, 0x0, &(0x7f0000003740)=[{&(0x7f00000021c0)=""/171, 0xab}, {&(0x7f0000002280)=""/107, 0x6b}, {&(0x7f0000002300)=""/192, 0xc0}, {&(0x7f00000023c0)=""/4096, 0x1000}, {&(0x7f00000033c0)=""/208, 0xd0}, {&(0x7f00000034c0)=""/177, 0xb1}, {&(0x7f0000003580)=""/175, 0xaf}, {&(0x7f0000003640)=""/140, 0x8c}, {&(0x7f0000003700)=""/57, 0x39}], 0x9, &(0x7f0000003800)=[@rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0x58}}, {{&(0x7f0000003880)=@abs, 0x6e, &(0x7f0000004b40)=[{&(0x7f0000003900)=""/114, 0x72}, {&(0x7f0000003980)=""/135, 0x87}, {&(0x7f0000003a40)=""/109, 0x6d}, {&(0x7f0000003ac0)=""/4096, 0x1000}, {&(0x7f0000004ac0)=""/86, 0x56}], 0x5}}, {{&(0x7f0000004bc0)=@abs, 0x6e, &(0x7f0000005d40)=[{&(0x7f0000004c40)=""/4096, 0x1000}, {&(0x7f0000005c40)=""/235, 0xeb}], 0x2, &(0x7f0000005d80)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x50}}], 0x6, 0x142, &(0x7f0000005fc0)={r2, r3+60000000}) tkill(r5, 0x2e) ptrace$getregset(0x4204, r4, 0x3, &(0x7f0000006080)={&(0x7f0000006000)=""/72, 0x48}) 03:16:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:11 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:16:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:11 executing program 5: r0 = fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) ptrace$getregset(0x4204, r1, 0x3, &(0x7f00000000c0)={&(0x7f0000000000)=""/134, 0x91}) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f0000000140)) 03:16:11 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:11 executing program 4: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f00000005c0)=ANY=[@ANYBLOB="5c000000150001000000000000000000ff010000000000000000000000000001fe8000"/64, @ANYRES32=0x0, @ANYRES32=0xee00, @ANYBLOB="be6b6e0f2cb1dfb5cafff2080008000000000000000000000091ae085100000000000036905b91cea1f2699f2f2be6b576bb868fe02fbdee6a428e9cb48770c5f17cd69cf046d15c1a8c218ab1c62e514dd132f6e5ef27505a65c12dbef1e177c74498dbaac00d03cb7e21f0ee538087202340b515702506c3b76823d3cee94fe37c8128568498f074b8d98135c4361a5e11ec02b2e661ef06050021d3fe6b83ffa6a492b5fd0359dc99e856220989aa1f00fc2b6baac18fda7be2ed404821065c52ef13a444bb97d1e95c47ff695ae1f7240cb3b4c3aad2fc3712f662263aeadf6416e13325afa78cdf"], 0x5c}}, 0x0) sync_file_range(r0, 0x7, 0x36b0, 0x7) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_ADD(r2, &(0x7f0000000280)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x1}, 0xc, &(0x7f0000000240)={0x0, 0x24}, 0x1, 0x0, 0x0, 0x1}, 0x880) sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(r1, &(0x7f0000000180)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x44, 0x0, 0x800, 0x70bd2d, 0x25dfdbfd, {}, [@NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0xcc}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5, 0xf, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_MAX_FRAME_RETRIES={0x5}]}, 0x44}, 0x1, 0x0, 0x0, 0x4000}, 0x20000000) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x248e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r3 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$nl_generic(r3, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000480)={&(0x7f0000000080)=ANY=[@ANYBLOB="1c0000001d00210c000000000000000004000202"], 0x1c}}, 0x0) 03:16:11 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, 0x0, &(0x7f0000000400)) getegid() r1 = creat(&(0x7f0000000440)='./file0\x00', 0x0) openat(r1, &(0x7f0000000280)='./file0\x00', 0x488000, 0x4e) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000100)=""/15, 0xf}, {&(0x7f0000000140)=""/230, 0xe6}], 0x2, &(0x7f00000002c0)}, 0x10001) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_DSTOPTS(r3, 0x29, 0x3b, &(0x7f0000000200)=ANY=[], 0x8) sendmmsg$inet6(r3, &(0x7f0000000040)=[{{&(0x7f0000000000)={0xa, 0x4e23, 0x0, @empty}, 0x1c, 0x0}}, {{0x0, 0x0, &(0x7f0000000640)=[{&(0x7f0000000440)="10", 0xffd0}], 0x1}}, {{0x0, 0x0, &(0x7f0000000900)=[{&(0x7f00000008c0)="7f", 0x1}], 0x1}}], 0x28, 0x8080) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0xffff) fcntl$dupfd(r4, 0x0, r3) sendmsg$inet6(r3, &(0x7f0000004380)={0x0, 0x0, 0x0}, 0x0) pread64(r2, &(0x7f0000000480)=""/91, 0x5b, 0x8) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x3}, &(0x7f0000000080)='\a', 0x1, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000a00)=ANY=[], 0x98a) unshare(0x5a030a80) [ 559.701093] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. 03:16:11 executing program 0: ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8914, 0x0) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000000040)={@private1}, 0x14) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$IPCTNL_MSG_CT_GET_STATS(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x1000000}, 0xc, &(0x7f0000000680)={&(0x7f00000000c0)={0x14, 0x5, 0x1, 0x101, 0x0, 0x0, {0x0, 0x0, 0xffff}}, 0x14}, 0x1, 0x0, 0x0, 0x800c010}, 0x81) openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x406e2, 0x0) epoll_pwait(0xffffffffffffffff, &(0x7f0000000040)=[{}], 0x1, 0x0, &(0x7f0000000080), 0x8) sendmsg$nl_generic(r0, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000011c0)=ANY=[@ANYBLOB="20003dd800023c0000ffffd800000000000000080000000000f4ff0000000400"], 0x20}}, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000000), 0x1a1001, 0x0) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'lo\x00'}) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xfffffffffffffffb, 0xfffffffffffffffc}, 0x2, 0x0, 0x1004, 0x0, 0x0, 0xffffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r3, 0x8914, &(0x7f0000000140)={'lo\x00'}) [ 559.747450] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:16:11 executing program 5: r0 = fork() ptrace(0x10, r0) getpgid(r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x20000000, &(0x7f00000003c0)) 03:16:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:12 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 560.277233] netlink: 12 bytes leftover after parsing attributes in process `syz-executor.4'. [ 560.280081] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.4'. 03:16:25 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:16:25 executing program 2: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="20000000000100000c000000d40000000f000000010000000000000000000000002000000020000020000000d7f4655fd7f4655f0100ffff53ef010001000000d7f4655f000000000000000001000000000000000b00000000020000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="030000000400000005000000d4000f", 0xf, 0x800}, {&(0x7f0000010500)="ffffffffff070000000000000000000000000000000000000000000000000080ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff", 0x402, 0xc00}, {&(0x7f0000010e00)="ed41000000040000d7f4655fd7f4655fd7f4655f000000000000040002", 0x1d, 0x1600}], 0x8010, &(0x7f0000000580)=ANY=[@ANYBLOB="004eacec96f3c1aa396415dd0a7f001ad8f12a0550226bd1e28d879881662de6e6455c10101413dd1af65629c18457a48018181c0886b1f44bfb08b4ddcdc7e2f6379d5decb37f7b439736147bf79be0eb4803c5799445d89e61b08b2c11cc305f4594694657ec2683dc024b53e71166a303b4824dd89c0676954b9f387670b4913b00"/148]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x105142, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0xe542, 0xc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write(r3, &(0x7f0000000240)="01", 0x1) openat(r3, 0x0, 0x0, 0x12) fcntl$dupfd(0xffffffffffffffff, 0x406, 0xffffffffffffffff) openat(r0, &(0x7f0000000140)='./file1\x00', 0x46200, 0x122) preadv(0xffffffffffffffff, &(0x7f0000000040)=[{&(0x7f00000011c0)=""/121, 0x79}, {&(0x7f0000000300)=""/171, 0xab}, {&(0x7f0000000200)=""/204, 0xcc}], 0x3, 0xfffffffe, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000400)=0x53, 0x101) ioctl$EXT4_IOC_GROUP_EXTEND(0xffffffffffffffff, 0x40086607, &(0x7f00000003c0)) r4 = fsmount(0xffffffffffffffff, 0x0, 0x88) fcntl$dupfd(r4, 0x406, 0xffffffffffffffff) dup2(0xffffffffffffffff, 0xffffffffffffffff) fcntl$getown(0xffffffffffffffff, 0x9) migrate_pages(0x0, 0x4, &(0x7f0000000200), &(0x7f00000000c0)=0x2) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x4000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x15100, 0x1f, 0x0, 0x4}, 0x0, 0xfffffffffffffdff, 0xffffffffffffffff, 0x0) write$P9_RREADLINK(r1, &(0x7f0000000140)=ANY=[], 0x10) sendfile(r1, r2, 0x0, 0x20d315) 03:16:25 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:16:25 executing program 7: r0 = perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_io_uring_setup(0x7b29, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, r0}, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000040)=0x0) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x141043, 0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000000)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x2, 0x0, r4}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r1, 0x0) r5 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r1, 0x8000000) syz_io_uring_submit(r5, r3, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd_index, 0x0, 0x0}, 0x80000001) syz_io_uring_submit(r2, r3, &(0x7f00000000c0)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd_index=0xa, 0x3bec, 0x0, 0x8000}, 0x1) io_uring_enter(r1, 0x58ab, 0x0, 0x0, 0x0, 0x0) openat$tun(0xffffffffffffff9c, 0x0, 0x0, 0x0) lseek(0xffffffffffffffff, 0x0, 0x3) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000140)={0x0, 0x0, &(0x7f0000000080)={0x0, 0x102c}}, 0x0) ioctl$sock_inet_SIOCSIFNETMASK(0xffffffffffffffff, 0x891c, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(0xffffffffffffffff, 0xc400941d, 0x0) 03:16:25 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, r0, &(0x7f0000000000), 0x8, &(0x7f00000003c0)) 03:16:25 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r0, 0x1000003) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000001400)) write$binfmt_elf64(r0, &(0x7f00000001c0)=ANY=[], 0xfdef) ioctl$FS_IOC_FSSETXATTR(0xffffffffffffffff, 0x401c5820, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup2(0xffffffffffffffff, 0xffffffffffffffff) lseek(r0, 0x0, 0x3) 03:16:25 executing program 0: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000240)=[{&(0x7f0000000340)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x4000, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat$procfs(0xffffffffffffff9c, &(0x7f00000000c0)='/proc/schedstat\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r2, &(0x7f0000019340)=""/102400, 0x19000) r3 = io_uring_setup(0xd58, &(0x7f0000000bc0)={0x0, 0x0, 0x0, 0x0, 0xfffffffe}) io_uring_register$IORING_REGISTER_FILES(0xffffffffffffffff, 0x2, &(0x7f00000000c0)=[r3, r2], 0x2) r4 = socket$nl_audit(0x10, 0x3, 0x9) openat$nvram(0xffffffffffffff9c, &(0x7f0000000380), 0x480, 0x0) open(&(0x7f0000000140)='./file0\x00', 0x40, 0x41) ppoll(&(0x7f00000003c0)=[{0xffffffffffffffff, 0x7184}, {r2, 0x9401}, {r4, 0x308c}], 0x3, &(0x7f0000000400), &(0x7f0000000440)={[0x4]}, 0x8) r5 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x98) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r5, 0x0, 0x80000001) 03:16:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 573.444589] EXT4-fs (loop2): mounted filesystem without journal. Opts: ,errors=continue 03:16:25 executing program 2: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000080)='ns/pid_for_children\x00') r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) r5 = fork() kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) sendfile(r6, r7, 0x0, 0x100000001) perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x8, 0x40, 0x1, 0x7f, 0x0, 0x4, 0x8, 0x5, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x4, @perf_config_ext={0x101, 0x1}, 0x0, 0x3f, 0x101, 0x2, 0x10000, 0x21, 0x7e, 0x0, 0x40, 0x0, 0x7fffffff}, r1, 0x7, r7, 0x18) ioctl$NS_GET_PARENT(r0, 0xb702, 0x0) r8 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) syz_open_procfs(r5, &(0x7f0000000300)='net/arp\x00') r9 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r8, r9, 0x0, 0xffffffff) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r9, 0x6, 0x23, &(0x7f0000000240)={&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0, &(0x7f0000000100)=""/158, 0x9e, 0x1, &(0x7f00000001c0)=""/81, 0x51}, &(0x7f0000000280)=0x40) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r8, 0x6, 0x23, &(0x7f0000000400)={&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x0, 0x0, &(0x7f0000000340)=""/19, 0x13, 0x1, &(0x7f0000000380)=""/123, 0x7b}, &(0x7f0000000440)=0x40) 03:16:25 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:25 executing program 7: fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, r0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) signalfd4(r3, &(0x7f0000000000)={[0x3]}, 0x8, 0x0) sendmsg$NL802154_CMD_SET_SHORT_ADDR(r2, &(0x7f0000000280)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000240)={&(0x7f0000000140)={0x24, 0x0, 0x2, 0x70bd2b, 0x25dfdbfb, {}, [@NL802154_ATTR_SHORT_ADDR={0x6}, @NL802154_ATTR_SHORT_ADDR={0x6}]}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x80) r4 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000900), r2) sendmsg$IEEE802154_ADD_IFACE(r1, &(0x7f0000000180)={0x0, 0xfffffffffffffe9a, &(0x7f0000000040)={&(0x7f00000001c0)=ANY=[@ANYBLOB='4\x00\x00\x00', @ANYRES16=r4, @ANYBLOB="01000000a2d4e5712ad534694814eae900bb9328310000000005002000e9f2000000c20b8e25a1292c374898811efb0c75879a8d02512f4f1757c6fb066dffd1df13f77fbcda26f57ba822e87355f3ffda07373c608e01242c61c300"/109], 0x34}}, 0x0) ioctl$GIO_SCRNMAP(r3, 0x4b40, &(0x7f00000002c0)=""/145) 03:16:25 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000140)={0x0, 0x0}) ptrace$setopts(0x4206, r1, 0x1, 0x2) 03:16:26 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:16:41 executing program 0: syz_usb_connect$cdc_ecm(0x0, 0x4d, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x800}, 0x1c280}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) timer_create(0x2, &(0x7f0000000240)={0x0, 0xb, 0x4}, &(0x7f0000000040)) openat$ttyS3(0xffffffffffffff9c, &(0x7f00000001c0), 0x280400, 0x0) kcmp(0x0, 0x0, 0x6, 0xffffffffffffffff, 0xffffffffffffffff) capset(&(0x7f0000000000)={0xc92bfb053a14a5a}, 0x0) timer_create(0x3, &(0x7f0000000000)={0x0, 0x1c, 0x0, @tid=0xffffffffffffffff}, &(0x7f0000000040)=0x0) timer_settime(r0, 0x0, &(0x7f0000000480)={{0x0, 0x3938700}, {0x0, 0x989680}}, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000100)={0x0, 0x0}) capset(&(0x7f0000000180)={0x20080522, r2}, &(0x7f00000002c0)={0x40, 0x2, 0xfffffaf2, 0x6, 0xffffffff, 0x40}) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000040)={0x14, 0x16, 0xd01}, 0x14}}, 0x0) read(r1, &(0x7f0000000080)=""/65, 0x41) timer_gettime(r0, &(0x7f0000000080)) clone3(&(0x7f00000001c0)={0x40182300, 0x0, 0x0, 0x0, {0x34}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:16:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:41 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:16:41 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'ip6gre0\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018", @ANYRES16=r1, @ANYRESOCT=r0]) r2 = socket$inet(0x2, 0xa, 0x0) syz_open_dev$vcsu(0x0, 0x80000001, 0x103881) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000180)={'icmp\x00'}, &(0x7f0000000240)=0x1e) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/keys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) 03:16:41 executing program 5: r0 = fork() waitid(0x1, r0, &(0x7f0000000600), 0x20000000, &(0x7f00000003c0)) 03:16:41 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:16:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:41 executing program 5: ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000000)=0x8) r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:16:41 executing program 4: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000240), 0x1, 0x0) write$binfmt_elf64(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="7f454c460000000000000000000000000300000002000000000000000000000040000000000000003300000000000000070000000100380000000000000000000000000000000000000000000000000000000000000000000400"/1144], 0x478) r2 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000500), 0x0, 0x0, 0x1, {0x0, r2}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f00000008c0)=@IORING_OP_LINK_TIMEOUT={0xf, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)={0x0, 0x989680}, 0x1, 0x1, 0x1, {0x0, r2}}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3, 0x0, 0x7f, 0x8, 0x0, 0x88a, 0x20021, 0x8, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x3, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80000000, 0x0, @perf_bp={&(0x7f0000000140), 0x2}, 0x8630, 0x4, 0x5, 0x8, 0x80000001, 0x0, 0x7cf3, 0x0, 0x4, 0x0, 0x81}, 0xffffffffffffffff, 0xc, r0, 0xb) socket$netlink(0x10, 0x3, 0x0) r3 = getpgid(0xffffffffffffffff) r4 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000200), 0x701180, 0x0) perf_event_open(&(0x7f0000000840)={0x0, 0x80, 0x40, 0x2, 0xfc, 0x9, 0x0, 0x43, 0x80001, 0xf, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0xafaf, 0x2, @perf_config_ext={0x7fffffff, 0x4}, 0x10000, 0xffffffffffffffc0, 0x6, 0x3, 0x1f, 0x4, 0x58a9, 0x0, 0x5, 0x0, 0xffffffff}, r3, 0xe, r4, 0xb) setresuid(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000740)=ANY=[@ANYBLOB="f400bb002c00010000000000000000000000000008000000", @ANYRES32=0x0, @ANYBLOB="d600008008000000", @ANYRES32, @ANYBLOB='\b\x00c\x00', @ANYRES32, @ANYBLOB="32f67763630fb377a3017dc05df31c71c5524e09295227d8fa8c977508c78afdc5a3e249cc9dadd058716bd71b0bc534788937f3b6f320e864ef6bef19107fb1d2f7dc3578d0cf7f0ed1feab0a8f7cc14d674e9389a306997930dbd341396c0296f0cb5dbfa613b8e409ba77f217db2064947e60e6ea6f16e1cfe9ebccb8c36ebf36eacdf8ddf26a1db58fb238999fccb3def2d44b7b58ce33d1c3141d47e5bb9a77327f33357b907683e2cc70d858c478bc9b5fd9122824608a67c27b7c0daa551d0000"], 0xf4}}, 0x0) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, &(0x7f0000000100)={'wlan0\x00'}) unshare(0x48020200) 03:16:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:42 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:42 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, 0x0, &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:42 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = getpgid(r0) ptrace(0x11, r1) r2 = getpid() r3 = getpgid(0x0) r4 = epoll_create(0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r4, &(0x7f0000000040)={r4, r5}) ptrace(0x11, r3) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:16:42 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:16:58 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:16:58 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:16:58 executing program 4: perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470008400f801", 0x17}, {0x0, 0x0, 0x1001000a00}], 0x2000, &(0x7f0000000240)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r2 = getpid() r3 = getpid() r4 = getpgid(0x0) r5 = epoll_create(0x1) r6 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000040)={r5, r6}) fcntl$getown(r5, 0x9) r7 = getpgid(r2) r8 = epoll_create(0x1) r9 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r8, 0x1, r9, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r2, r7, 0x7, r8, &(0x7f0000000040)={r8, r9}) sendmsg$nl_generic(r0, &(0x7f0000000200)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000300)={0x147c, 0x1c, 0x1, 0x70bd29, 0x25dfdbfe, {0xc}, [@nested={0x270, 0x42, 0x0, 0x1, [@typed={0x8, 0x74, 0x0, 0x0, @pid=r7}, @typed={0xc, 0xd, 0x0, 0x0, @u64=0x1ff}, @generic="d6236f12635f21fe76a41e46a8757f428782a86ac3feeb1bcb56540fc1a2805bbeb0a70334366b118dbeec5a2a171697617b31b46489d403e09ba9970b85ea8a9651880e33b9badef7a2ff78ae5bb94e333123af71604fb7fa75b91f57b90c53c92e7785891639701dad3aa5d2c78f684913b9569c8ffda72d914afe5d", @generic="e0ff09b58b891e75705da9be5f8806ddb374591b389ee99507692e4cb822db68781d312905a67a5a512df941f1013fdfac5c4c1cd3e4b3bd22a787b9fc70fef2a9bc4b0002370fe6b20ec019d03f9dc824369782fad9e1a2d393f3241689cd155fc8814f6e2fbfcfe902be51a8e4deca484adf124f8878f9118a8f98d1ce447f7ffc88a7f297e598e995d5cd25d3462d5b030b845cf7873659da6ea9fe7ba5760f9a8c617ae2bf89bca01094de394f8f6b6f11ba874e5203cff22225e33e5c6df75cd2c7d78998b24ec0bd5e7215fc8cce35caaf0ef1d9d5f6afdfb702bd93cc614b7419dd26a672552e83fb6720149c663bb190", @typed={0x8, 0x48, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x13}}, @typed={0x14, 0x38, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @generic="95a578a2dedacc1fb4d4d4940345fb50a69015", @typed={0x8, 0x51, 0x0, 0x0, @uid=0xee01}, @generic="668b203d4d2a347906df99f1d459dfad4cd60c4a8dd578174cdc6566a8c42ef71d44dd03123a702300622c74fc692c16fedb4044952dd834175a59a2f0ab538bdf37cc9df9dbd99b76dd1f72f2df2723f95887fa76115892afbdd77b103708b2f32d12d133e1fd9e9bf37bf4bcdcf2e273b24e82cdbcc875bd615f324eee62c8e9ba9fa382892cc715aff3a70b6fcc137bfef43b92d3af3e472e0e2ff0507914f6872c82ff1b4e0ab63817c94172c9a9"]}, @generic="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", @generic="26dedc4138b0182745ec94bd9a08fb0ad84a8b6d7710b237398f814c08453150cec1ea8fce5bc00f0315525476a661b450c0689c3f2e1d06e5d5284186e05ebe1b7f0a0f2cca01ad45416c818ee30af3edeb1861c0bec6ff8c6f68fcf6a9", @generic="b22b8fdbe180c6125a80016dae489475e929b10d9417161af0c77f2011c6e2ca7eb6f4e4aa2b1b8f91a75d707cbaa29bc43c27fb7c5c375e7256b7363c4b7ff5d42e018d17cb348afa0a9da309a2fba253e8eee6ce84061810895db97b1c3d9ed331a3499024acf1e851c1d7b86af515434358f4e6b3e197b966826caa5c4d88314287f42c", @generic="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", @generic="75613fce7f22d1a2c2f1265c8867a4de6bb6495ff7"]}, 0x147c}, 0x1, 0x0, 0x0, 0x80}, 0x0) sendfile(r0, r1, 0x0, 0x100000001) 03:16:58 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, 0x0, &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:58 executing program 2: ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "77004a6efdff00"}) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(0xffffffffffffffff, 0x400454d9, &(0x7f0000000040)={'ip6gre0\x00'}) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000080)=ANY=[@ANYBLOB="010000000100000018", @ANYRES16=r1, @ANYRESOCT=r0]) r2 = socket$inet(0x2, 0xa, 0x0) syz_open_dev$vcsu(0x0, 0x80000001, 0x103881) getsockopt$ARPT_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x0, 0x63, &(0x7f0000000180)={'icmp\x00'}, &(0x7f0000000240)=0x1e) ioctl$sock_inet_SIOCGIFNETMASK(r2, 0x8914, &(0x7f00000001c0)={'veth0_vlan\x00', {0x2, 0x0, @empty}}) openat$procfs(0xffffffffffffff9c, &(0x7f0000000100)='/proc/keys\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffffffffffffffff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) dup3(r2, r0, 0x0) 03:16:58 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x4, &(0x7f0000000100)) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) ptrace$setopts(0x4206, r2, 0x6, 0x44) tkill(r2, 0x26) 03:16:58 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, 0x0, &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:16:58 executing program 5: r0 = fork() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000080)=0x0) ptrace$peek(0x1, r1, &(0x7f0000000180)) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000000), 0x1, &(0x7f00000000c0)) 03:16:58 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:12 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:12 executing program 6: r0 = open(&(0x7f0000000000)='./file1\x00', 0x600000, 0x1b2) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}}, 0x0, 0xffffffffffffffff, r0, 0x0) lseek(r1, 0x0, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, 0x1c) fallocate(r1, 0x3, 0x52, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x5f42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x12, r3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x950) r4 = syz_open_dev$vcsa(&(0x7f0000000840), 0x401, 0x28180) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f0000000880)=0x1) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x7f, 0x9, 0x81, 0x0, 0x2947, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffff046, 0x2}, 0xc00, 0xc5c1, 0xfc9, 0x2, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x0, 0x5}, 0x0, 0xe, r1, 0xa) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r6, 0x540a, 0x2) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) write$binfmt_elf64(r6, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0xcf, 0x40, 0x3, 0x4, 0x3, 0x6, 0xfffff801, 0x2f3, 0x40, 0x69, 0x2c7, 0x8, 0x38, 0x2, 0x4, 0x3, 0x1}, [{0x2, 0x4, 0x5, 0x80, 0x1, 0x9, 0x20, 0x800}], "2fd7f1054f2cecc07f5f37c5d7a2430323857912ceb2869996849cb5d07c8ece1bbaf055c221b7e8cbd9a4bda4c886f5633cce5fe7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x8ad) pwrite64(r5, &(0x7f00000000c0)="041a3a4985d424bdce9675f286982a09f7fe7569cb2c6e71f89e8019678c585aa70cc9e2435235dcb0b3434020d0f4d5613bb8bde96608eaf4af1834720900b040007af6d3edc14cd7ab81c733b614b0835ac6af8173be3b00015a826f2562ae98feb0d40000f80000", 0xff69, 0x3ff03) 03:17:12 executing program 2: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, &(0x7f0000000140)={r1, 0x0, r0, 0x3}) r2 = timerfd_create(0x0, 0x0) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) fallocate(r3, 0x35, 0x100000000, 0x80) timerfd_gettime(r2, &(0x7f0000000080)) 03:17:12 executing program 5: r0 = fork() ptrace(0x10, r0) wait4(r0, &(0x7f0000000000), 0x8, &(0x7f0000000040)) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) ptrace$setopts(0x4200, r0, 0x10001, 0x100001) 03:17:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:12 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:12 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:12 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:12 executing program 4: perf_event_open(&(0x7f00000000c0)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={&(0x7f0000001200), 0x1}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$nl_generic(0xffffffffffffffff, 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x2}, 0x6) write$bt_hci(r0, &(0x7f0000000080)={0x1, @pin_code_neg_reply={{0x40e, 0x6}}}, 0xa) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) write$bt_hci(r0, &(0x7f00000001c0)={0x1, @read_remote_features={{0x41b, 0x2}, {0xc8}}}, 0x6) ioctl$sock_bt_hci(r0, 0x400448cb, &(0x7f0000000200)="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") syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r2 = fsmount(r1, 0x0, 0x88) openat(r2, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) write$bt_hci(r2, &(0x7f0000000000)={0x1, @io_capability_reply={{0x42b, 0x9}, {@fixed={'\xaa\xaa\xaa\xaa\xaa', 0x12}, 0x3, 0x40, 0x4}}}, 0xd) copy_file_range(0xffffffffffffffff, &(0x7f0000000040)=0xf800000000000000, 0xffffffffffffffff, 0x0, 0x8f48, 0x0) write$bt_hci(0xffffffffffffffff, &(0x7f0000001400)=ANY=[@ANYBLOB="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"], 0x6) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x0) ioctl$BTRFS_IOC_GET_SUPPORTED_FEATURES(r2, 0x80489439, &(0x7f0000000140)) dup(0xffffffffffffffff) unshare(0x48020200) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, 0x0) 03:17:12 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:12 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x90100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:12 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x1, &(0x7f00000003c0)) 03:17:26 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:26 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 5: r0 = fork() ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ptrace$setregset(0x4205, r1, 0x200, &(0x7f0000000140)={&(0x7f0000000040)="834b4dd6b57f08054ba22f5fa361aadcbf11d8f345168c8447be981b48dfdca7d45b0459c062b2b124298ded0af07629930a207f6ac8e24a1d2374c000e3d9a61ec07155bd22c12d679ab1c96a747a85240937adf3711247dcfa8283ad0e900175df550b98122caafec2e0c9d65c2e10f32e649e05ed2d34b92d6422276d2d4872edc80a27e3698a9e3ff57d5308cde4b642b03fee66c7c217e1f69d05aad0419c17bf463a4d37d59823c2359892a8b32da599491eb51af1e1b007982d9d6b8f01e6d9f2", 0xc4}) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:17:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:26 executing program 6: r0 = open(&(0x7f0000000000)='./file1\x00', 0x600000, 0x1b2) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000001c0), 0x8}}, 0x0, 0xffffffffffffffff, r0, 0x0) lseek(r1, 0x0, 0x1) r2 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000140)=0x1, 0x4) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x0, 0x0, @loopback={0x0, 0x7}}, 0x1c) fallocate(r1, 0x3, 0x52, 0x6) setsockopt$inet6_tcp_TCP_REPAIR(r2, 0x6, 0x13, &(0x7f0000000080), 0x4) r3 = openat$sr(0xffffffffffffff9c, &(0x7f00000002c0), 0x5f42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4, 0x12, r3, 0x0) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRESHEX], 0x950) r4 = syz_open_dev$vcsa(&(0x7f0000000840), 0x401, 0x28180) ioctl$F2FS_IOC_GARBAGE_COLLECT(r4, 0x4004f506, &(0x7f0000000880)=0x1) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x7f, 0x9, 0x81, 0x0, 0x2947, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x2, @perf_config_ext={0xfffffffffffff046, 0x2}, 0xc00, 0xc5c1, 0xfc9, 0x2, 0x2, 0x7, 0x0, 0x0, 0x10001, 0x0, 0x5}, 0x0, 0xe, r1, 0xa) r5 = creat(&(0x7f0000000080)='./file0\x00', 0x0) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r6, 0x540a, 0x2) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) write$binfmt_elf64(r6, &(0x7f00000008c0)={{0x7f, 0x45, 0x4c, 0x46, 0x8, 0xcf, 0x40, 0x3, 0x4, 0x3, 0x6, 0xfffff801, 0x2f3, 0x40, 0x69, 0x2c7, 0x8, 0x38, 0x2, 0x4, 0x3, 0x1}, [{0x2, 0x4, 0x5, 0x80, 0x1, 0x9, 0x20, 0x800}], "2fd7f1054f2cecc07f5f37c5d7a2430323857912ceb2869996849cb5d07c8ece1bbaf055c221b7e8cbd9a4bda4c886f5633cce5fe7", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x8ad) pwrite64(r5, &(0x7f00000000c0)="041a3a4985d424bdce9675f286982a09f7fe7569cb2c6e71f89e8019678c585aa70cc9e2435235dcb0b3434020d0f4d5613bb8bde96608eaf4af1834720900b040007af6d3edc14cd7ab81c733b614b0835ac6af8173be3b00015a826f2562ae98feb0d40000f80000", 0xff69, 0x3ff03) 03:17:26 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) pwrite64(r1, &(0x7f0000000400)="b33fc960c26c650445863c2a674ae22e7140500010245c9e7a7789acb35a969c3f76653d4c1d03b1b84b1246f8336556edf6c3acb09a90ed5b076c43d5ad24f458b4903ede5e77258aba31eb6bb3f3272492fda5fb954672f7f53996ba943526bc7ddad551056fdb8da28446236971b1f66434c78c406d", 0x77, 0x7) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x0, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:26 executing program 6: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000000c0)='./file1/file0\x00', 0x9, 0x2, &(0x7f0000000100)=[{&(0x7f0000000140)="eb3c906d6b66732e66617400020801000470000000f801", 0x17}, {0x0, 0x0, 0x1000a00}], 0x0, &(0x7f00000000c0)=ANY=[]) chdir(&(0x7f0000000040)='./file0\x00') r1 = openat(r0, &(0x7f00000002c0)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1/file0\x00', 0x0, 0xb4) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) ftruncate(r3, 0x1000003) r4 = inotify_init1(0x80000) ioctl$AUTOFS_IOC_FAIL(r4, 0x9361, 0x0) uselib(&(0x7f0000000000)='./file1/file0\x00') 03:17:26 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x0, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:26 executing program 4: syz_emit_ethernet(0x7a, &(0x7f0000000000)={@local, @remote, @void, {@ipv6={0x86dd, @gre_packet={0x0, 0x6, "f27e5f", 0x3, 0x11, 0x0, @remote, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}}}}}, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r0, 0xffffffffffffffff) write$tun(r0, &(0x7f0000000200)=ANY=[@ANYBLOB="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"], 0x5) 03:17:26 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:26 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x0, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:41 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:41 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:41 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:41 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:41 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:41 executing program 5: r0 = fork() fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:17:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x0, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:41 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x0, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:41 executing program 5: r0 = fork() r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) ptrace(0x4208, r2) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:17:41 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x0, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:55 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:55 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:55 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) 03:17:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:55 executing program 5: r0 = fork() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000000)={0x0}, &(0x7f0000000040)=0xc) r2 = getpid() r3 = getpgid(0x0) r4 = epoll_create(0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r4, &(0x7f0000000040)={r4, r5}) r6 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r6, 0x540a, 0x2) ioctl$TCSETSF(r6, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) kcmp(r1, r2, 0x6, 0xffffffffffffffff, r6) ptrace(0x10, r0) waitid(0x0, 0x0, &(0x7f0000000600), 0x1, &(0x7f00000003c0)) fork() 03:17:55 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:55 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x0, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:55 executing program 2: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000), &(0x7f0000000400)=ANY=[@ANYBLOB="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"], 0x6e, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f00000001c0), r1) syz_open_dev$tty20(0xc, 0x4, 0x1) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r4, 0x540a, 0x2) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$KDSKBMETA(r4, 0x4b63, &(0x7f0000000040)=0x4) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x2) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) sendmsg$NL80211_CMD_GET_SCAN(0xffffffffffffffff, &(0x7f0000001600)={0x0, 0xfffffffffffffd4c, &(0x7f0000000200)={&(0x7f00000000c0)=ANY=[@ANYRES16=r3, @ANYRES32=r3, @ANYRESHEX=r2, @ANYRESDEC=r0], 0x1c}}, 0x811) syz_genetlink_get_family_id$batadv(&(0x7f0000000100), r1) ioctl$TIOCGPTPEER(r0, 0x5441, 0x2) 03:17:55 executing program 5: r0 = fork() ptrace$setopts(0x4200, r0, 0x8000, 0x100029) sched_setaffinity(r0, 0x8, &(0x7f0000000000)=0x400) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:17:55 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) 03:17:55 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:55 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:17:55 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:17:55 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x1, 0x0, &(0x7f0000000600), 0x4, &(0x7f0000000000)) r1 = shmget$private(0x0, 0x6000, 0x10, &(0x7f0000ffa000/0x6000)=nil) shmctl$IPC_RMID(r1, 0x0) 03:18:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:08 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) 03:18:08 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) ftruncate(r0, 0xffff) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x105142, 0x0) r2 = syz_open_procfs(0x0, &(0x7f00000000c0)='net/snmp\x00') r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x20, 0x7, 0x4, 0x20, 0x0, 0x4, 0xb2648, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x0, @perf_config_ext={0x7, 0x9}, 0x2000, 0x1, 0x7, 0x2, 0x0, 0x2, 0x40, 0x0, 0x2, 0x0, 0xfffffffffffff3ce}, 0xffffffffffffffff, 0x6, r3, 0x8) preadv(r2, &(0x7f0000000080)=[{&(0x7f00000011c0)=""/121, 0x79}], 0x1, 0x0, 0x0) r5 = fsmount(r2, 0x0, 0x88) lseek(r1, 0x800, 0x4) sendmmsg$inet6(r5, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x400}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(r5, &(0x7f0000000280)='/proc/self/exe\x00', 0x0, 0xc3) sendfile(r1, r6, 0x0, 0x100000001) 03:18:08 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000200)='./file0\x00', 0x0, 0x0, 0x0, 0x119a014, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8001, 0x5cb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000380)='ext2\x00', &(0x7f0000001780)='./file0\x00', 0x1a5, 0x7, &(0x7f0000001b00)=[{&(0x7f00000017c0)="a8469c4fbb51200a4ab4e5e059f27c3f239eec00a3ea296709916dc1afe7d9d8568426ef879f29f1f566e6219f1375a6ee84cdf6597c7c570f3361ab2efe12817d929ff3611b5a98cdfcf045fceeda3ff9a6377f28016cdc8bff63cca58ef77743986b3f459a326e2eef9f14c5abc1807d5c0bceb412b053932b6eeced0983b3e25205aef994a2f4301aec5322bf769934d3dae2fe6df05671559c7e4f17d75cc4064f8f9e6a81f217e782f1b8a0bd2caf6444e9e1adbeb6dfc717bd05a79ec4d9f4193f5e55fa800e755a86f35592fed6be69d93ff9b5", 0xd7, 0x200}, {&(0x7f00000018c0)="9254b8f5e8a849452b40a546bae68663cc30e05ae690c0af56", 0x19, 0x4}, {&(0x7f0000001900)="1aca6353ddec3489a912786daa14fb87a639a7e2a4ceb87083673f8bb33d994fb80dcb9fe4154a5d5c886f", 0x2b, 0xc6cf}, {&(0x7f0000001940)="f080766caf6583a8f6c3ceb5d54d5e5baf4aa8b937bfce3705c7d889ea5ad62626a1b96f9cbb34cb10020ce56097a468c2919dadcf3c8f1ebf710b933606b68f0ebe5965da8fbfe9cc4dfea3847bb8a2cb9656412a90e06085fc82", 0x5b, 0x7}, {&(0x7f00000019c0)="45721a26e8f35dcb14072ef3ea91641202d56865936f", 0x16, 0x100}, {&(0x7f0000001a00)="6a0dad20c49fe0bf8ac8750f17c8f3f45d4f118c26a4c820e420717ed3583a4580e942743c89394854d2c6cb42dd56426958db5de1f5cdfd85d1e479e07c0338f242ce9591b77fb79b721b5581b8534153d8ff2163d2b3a5b2f16d23b293a4711febef720b4c7f4621515ec74219f6a2777545e16a5c3e32743fa6d90dc612b915df90f345d5f27940f36daf8fdf331ac940d74e9b8b76bbadd2f587f2c71219ec1cb7cfea786d0eae0e74d8a5acf73070559e4ff5adb10a34a0f9e50381ced0cb230a6f7f2369f616f53282bda6e08004243f8779a2358fbbd2cb99def734fadac9b8ec598e", 0xe6, 0x6}, {&(0x7f0000001e00)="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", 0x1000, 0x7f}], 0x100040, &(0x7f0000002ec0)={[{@abort}, {@data_err_abort}, {@usrjquota}, {@noload}, {@journal_dev={'journal_dev', 0x3d, 0x3}}, {@journal_ioprio={'journal_ioprio', 0x3d, 0x4}}, {@resuid}, {@errors_remount}, {@oldalloc}, {}, {@nodelalloc}, {@max_dir_size_kb={'max_dir_size_kb', 0x3d, 0x9}}], [{@obj_user={'obj_user', 0x3d, '\xeb$H\xa3e\x17(\xf9F\xc1V\xf8\xf7\x00\x00\x85\xfe~^\xc8y\xbc\xf8\x00\x00\x00\x00\x00\xc9-l\x7f\x90P\xbd\x1bk\xdf\xf6H\xd5\xf3\\\xd2|e:7{\xca\xbd\xcf\xae\xdeU\xcc\xc8+*q\xef\x1fz0\xb6\xf8\xc9\x1d\x1a\x89\xd5\xee\x84\xb8T\xa3oLj/\x16\xc6\x165\x18\xe4\x81b\xbaf-0/\xbb\xfe\xd9\x0e \xdf\xf2R\x93\xac\x10\x1b\xa6\x9e\x1e\x90}8\xc3,\xbe\xcc\xe4\x84\xd3\xdb\xaa\x97\x7f\xd7\x19{!\tl?\xd0\x02ih)t\xaf\xe4#\xefO\xcfB\xe3\xf9\xfd[X\x91\x19.\xac\xee[u\xaa\xe48\xe4\xa9,\xbfi\xc7\x1c\xba\x9f\xc2!\xf9\x10\r\xd4\x8c\xd1W\xe8\xef\xffii\x98\nM#M?3\xd6rE\xf0=B\xa0%\x18\x84\xf6\'\xde\x10P \x9cW5\xea\xce;\xe9\xe6\xef^]\xe5\xa54\x1d:\xf5!\xb2\xf0\xab\x14\x14\"}\t%G\xb3\xbf\a\x10\x1d\xed\x93R\xf7\xeb?\xf1\x12f\x17\"oc7\x85M\x06\xb4U\x85\x92?\xfa\r1\xd3\x91\xe7'}}, {@defcontext={'defcontext', 0x3d, 'sysadm_u'}}, {@euid_gt}]}) mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x300b4e2, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r0, 0x8914, &(0x7f0000000140)={'lo\x00'}) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) syz_mount_image$vfat(&(0x7f00000000c0), &(0x7f00000016c0)='./file0\x00', 0x80000000, 0x1, &(0x7f00000001c0)=[{&(0x7f00000002c0)="4d933a114011a78b78c997898954a6baced2016705f13e5fcac496b8b59a17d9e932cc16a11725041814b3dfa3835dd19760415e7fba99c3789991787f4538203baa913d617fd1a48b83efcdd357ae02f9fb4fcfaa4702e81b28b6fe5a5be70a39f37fa1d679034b131b1560cd694c42e760cf853224fc77", 0x78, 0x8}], 0x10, &(0x7f00000004c0)=ANY=[@ANYBLOB="616c6c6f775f7574696d653d30303030303030303030303030303030303034323733332c6e6e6f6e756d7461696c3d312c86686f72746e616d653d77696e6e742c666f776e65723cae2f6ce293abd295495743066d1a41f4bf2f3e7476b04550463dd843e6ae536e7eb5faad08983eeaca8550cffae132e4c7028e879e4dfdc16e281abf595f6dd4afe610937dd6967b7e27f72015", @ANYRESDEC=0x0, @ANYBLOB=',mask=^MAY_WRITE,\x00']) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r2, 0x8933, &(0x7f0000000140)={'syzkaller0\x00', 0x0}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) syz_mount_image$vfat(&(0x7f0000000240), &(0x7f0000000340)='./file0\x00', 0xff, 0x4, &(0x7f0000001640)=[{&(0x7f0000000440)="62cb35a79f13b0cb3853210623df401fc817af1f767092cf3084e233d4d5541c9e6be20b6277ae9637566daaa290cd78d9e92a824c80f5209c9781f6073124a603b97021ed56d29b43cc9a956e1bc7b41eebc30600017dcfaa82842b058fb1ef0c0cd347192112dd59f81500cdc294890765acf1392b7bf34d6ac612d7", 0x7d, 0xebb}, {&(0x7f0000003100)="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", 0x14c, 0x800}, {&(0x7f00000005c0)="6e7e2b7ee0c420cf7bc8d0b1d3c3adfb36b37e4b76be1f646fc32dfddb9e9479513133aefa80ec5463610296e670ff8d9deb29f403f82fb788f891d24b43cb02153132ae3370c7df81f4e300d4a0d711a93e", 0x52, 0x4}, {&(0x7f0000000640)="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", 0x1000}], 0x2088001, &(0x7f00000032c0)=ANY=[@ANYBLOB='nonumtail=0,uni_xlate=0,check=strict,nonumtail=0,dos1xfloppy,euid>', @ANYBLOB="f4ccced5b2c1c060fd8c840e2ba44ec91fd122c9e4a8c1e20f6678474245815d78881153c57c336f9e4caeade76ef2091fe27d5f96bb35b4c4044259d8a184a9dea344d9516f0934d2eed5904ff7bcd2f812a6f9258e1e18dae887ac8dc6a385824a80b3ff027df3c750e5f9a975e226c8392bf38774599c207c57d1164299e338d04ba50589fa67ccae148f8657a6ce47abde81f319cc33ba0aaa6cef133798451a66e25d", @ANYBLOB=',dont_measure,defcontext=staff_u,fsname=+&+,euid=', @ANYRESDEC=r4, @ANYBLOB="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"]) ioctl$sock_inet6_SIOCSIFADDR(0xffffffffffffffff, 0x8916, &(0x7f0000000180)={@loopback, 0x0, r3}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) bind$inet6(0xffffffffffffffff, &(0x7f0000000040)={0xa, 0x4e24, 0x5, @private2, 0x3602928f}, 0x1c) ioctl$sock_inet_SIOCGIFPFLAGS(0xffffffffffffffff, 0x8935, &(0x7f0000000000)={'wlan0\x00'}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x15, 0x0, 0x0, 0x0, 0x0, 0x100000000000005e, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x1004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGIFINDEX(r1, 0x8914, &(0x7f0000000140)={'lo\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000000280), 0xffffffffffffffff) 03:18:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 676.365552] FAT-fs (loop2): Unrecognized mount option "nnonumtail=1" or missing value 03:18:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x46842, 0x0) io_setup(0x5, &(0x7f0000000080)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r5 = syz_io_uring_setup(0x3de4, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) fsync(r6) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000680)=ANY=[@ANYBLOB="0000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000ff7f00000500000000000000ffff00000000000008000000000000000104000000000000000000000000000000000000000000000000000000000000090000008100000000000000feff000000100000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076032bdd23a9445547e3265f484a26d100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001200"/499]) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x1000}) io_uring_enter(r5, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000240)) 03:18:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:08 executing program 5: seccomp$SECCOMP_GET_NOTIF_SIZES(0x3, 0x0, &(0x7f0000000000)) setsockopt$packet_int(0xffffffffffffffff, 0x107, 0x9, &(0x7f0000000040)=0x20, 0x4) r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000100), 0x8, &(0x7f0000000240)) [ 676.591087] FAT-fs (loop2): Unrecognized mount option "nnonumtail=1" or missing value 03:18:08 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:08 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:08 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, 0x0) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:09 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:09 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:09 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) 03:18:09 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:09 executing program 5: r0 = fork() tkill(r0, 0x11) ptrace(0x10, r0) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) waitid(0x0, r2, &(0x7f0000000600), 0x20000000, &(0x7f0000000180)) ptrace$setregset(0x4205, r0, 0x4, &(0x7f0000000080)={&(0x7f0000000000)="563e82ce7d3c9b3963aff782dac634c97a8cf4a2d34cb56f2e1989f698fdaa62b752ae008de3ccf0ee835b77c58749006a37eedc1793ef480c554a9e24d64e96467f0737177314044002e4ca338cda07ad4e4eb516ff16cef269f8bc0aed74feedf08f4705c95e3bd60d4e24e1d90c3c2ffd", 0x72}) 03:18:09 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:09 executing program 6: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40040, 0x4, &(0x7f0000000200)=[{&(0x7f0000010000)="200000008000000006000000660000000f000000000000000100000001000000004000000040000020000000d3f4655fd4f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000002", 0x5a, 0x400}, {&(0x7f0000010300)="02000000030000000400000066000f000300040000000000000000000f007f5c", 0x20, 0x800}, {&(0x7f0000011500)="ed41000000080000d3f4655fd3f4655fd3f4655f000000000000040004", 0x1d, 0x2200}, {&(0x7f0000000140)="20000000eef2b93c8068808a2b", 0xd, 0x2280}], 0x0, &(0x7f0000000280)=ANY=[@ANYBLOB="828c58e6611e0698f992d697434bda67a5bb43219c915b20d9197bb04c5df44b8e8c69cb20e0f15a58a7b7d456b184788e83d7b12833d0ed63dca409574dba33b7b17b4fbfb69545feae5bd168b1b2fb74e89e82bf55056932c81f23d411ea11922ebb42e79bbb6957e81717db31b3b5e54331bffe5f82ef636fcddb97e8409a30b4a64e0854f7c8d3db84b597e0936eab236aa64582b657cf933e37aba4f40adcc19b85c40f767c392191cf6c83edd09effa695f42aac63f4a99217328ac7d3d89f2849556a8aa7926d34fd18499bb9eed2beee"]) r0 = openat$snapshot(0xffffffffffffff9c, 0x0, 0x0, 0x0) dup2(r0, r0) [ 677.069952] EXT4-fs (loop6): Unrecognized mount option "‚ŒXæa˜ù’Ö—CKÚg¥»C!œ‘[ Ù{°L]ôKŽŒiË àñZX§·ÔV±„xŽƒ×±(3Ðícܤ WMº3·±{O¿¶•Eþ®[Ñh±²ûtèž‚¿Ui2È#Ôê’.»Bç›»iWèÛ1³µåC1¿þ_‚ïcoÍÛ—è@š0´¦NT÷ÈÓÛ„µ—à“n«#j¦E‚¶WÏ“>7«¤ô [ 677.069952] ÜÁ›…Äv|9!‘ÏlƒíОÿ¦•ô*¬cô©’2ŠÇÓØŸ(IUjŠ§’m4ýI›¹îÒ¾î" or missing value [ 677.126063] EXT4-fs (loop6): Unrecognized mount option "‚ŒXæa˜ù’Ö—CKÚg¥»C!œ‘[ Ù{°L]ôKŽŒiË àñZX§·ÔV±„xŽƒ×±(3Ðícܤ WMº3·±{O¿¶•Eþ®[Ñh±²ûtèž‚¿Ui2È#Ôê’.»Bç›»iWèÛ1³µåC1¿þ_‚ïcoÍÛ—è@š0´¦NT÷ÈÓÛ„µ—à“n«#j¦E‚¶WÏ“>7«¤ô [ 677.126063] ÜÁ›…Äv|9!‘ÏlƒíОÿ¦•ô*¬cô©’2ŠÇÓØŸ(IUjŠ§’m4ýI›¹îÒ¾î" or missing value 03:18:32 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:32 executing program 4: mknod$loop(&(0x7f0000000400)='./file0\x00', 0x6000, 0x0) r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000240)='./file0\x00', 0x46842, 0x0) io_setup(0x5, &(0x7f0000000080)) r2 = creat(&(0x7f0000000000)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0x8800000) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0x5, r3, 0x0) ioctl$BLKTRACESETUP(r0, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x100, 0xb91}) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000440)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="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"]) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) r5 = syz_io_uring_setup(0x3de4, &(0x7f0000000080), &(0x7f00000a0000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000000180), &(0x7f0000002a40)) ioctl$BLKTRACESTART(r4, 0x1274, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x882c2, 0x0) fsync(r6) ioctl$FS_IOC_GETFSMAP(r6, 0xc0c0583b, &(0x7f0000000680)=ANY=[@ANYBLOB="0000000000000000050000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000007000000ff7f00000500000000000000ffff00000000000008000000000000000104000000000000000000000000000000000000000000000000000000000000090000008100000000000000feff000000100000000000000100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000076032bdd23a9445547e3265f484a26d100000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001200"/499]) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) kcmp$KCMP_EPOLL_TFD(0xffffffffffffffff, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff, 0x1000}) io_uring_enter(r5, 0x76d3, 0x0, 0x0, 0x0, 0x0) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000240)) 03:18:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:32 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:32 executing program 5: r0 = fork() r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) ptrace$setopts(0x4200, r2, 0x100000001, 0x20) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:18:32 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:32 executing program 5: r0 = fork() r1 = fcntl$getown(0xffffffffffffffff, 0x9) r2 = getpgrp(0xffffffffffffffff) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r4 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) getsockopt$bt_BT_RCVMTU(0xffffffffffffffff, 0x112, 0xd, &(0x7f0000000040)=0x1, &(0x7f00000000c0)=0x2) ioctl$TCXONC(r4, 0x540a, 0x2) r5 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r5, 0x540a, 0x2) ioctl$TCSETSF(r5, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$TIOCGPGRP(r5, 0x540f, &(0x7f0000000100)) ioctl$TCSETSF(r4, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) kcmp(r1, r2, 0x4, r3, r4) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:18:32 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:45 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) setns(r1, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), r1) sendmsg$TIPC_CMD_SET_NETID(r0, &(0x7f0000000240)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x24, 0x0, 0x20, 0x70bd28, 0x0, {{}, {}, {0x8, 0x2, 0xffff7fff}}}, 0x24}, 0x1, 0x0, 0x0, 0x20040001}, 0x4000000) getpeername$netlink(r1, &(0x7f0000000280), &(0x7f00000002c0)=0xc) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) syz_genetlink_get_family_id$ethtool(&(0x7f0000000140), r2) timerfd_settime(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r3, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000000100)={0x1c, 0x1a, 0x101, 0x0, 0x0, {}, [@generic="7b828f25ec5b"]}, 0x1c}}, 0x0) readv(0xffffffffffffffff, &(0x7f0000000180)=[{0x0}, {&(0x7f0000000400)=""/253, 0xfd}], 0x2) unshare(0x48020200) 03:18:45 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:45 executing program 5: r0 = fork() r1 = getpgid(r0) r2 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x4, 0x8, 0x0, 0x0, 0x0, 0x5, 0xc0400, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0xfa, 0x7}, 0xc, 0x400, 0x1f, 0x0, 0x1000, 0x7fffffff, 0x6, 0x0, 0x7}, r1, 0x3, 0xffffffffffffffff, 0xe) ptrace(0x10, r0) getpgrp(r1) ioctl$F2FS_IOC_GET_COMPRESS_BLOCKS(r2, 0x8008f511, &(0x7f0000000080)) 03:18:45 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:18:45 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, 0x0, 0x0, 0x200000048) 03:18:45 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:45 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:45 executing program 6: r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r3, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000005c0)=@newspdinfo={0x3c, 0x24, 0x800, 0x70bd2c, 0x25dfdbff, 0x5, [@XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}, @XFRMA_SPD_IPV4_HTHRESH={0x6}, @XFRMA_SPD_IPV6_HTHRESH={0x6}]}, 0x3c}, 0x1, 0x0, 0x0, 0x2000010}, 0x4000) sendfile(r3, r0, &(0x7f0000000140)=0x7, 0x0) r4 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r2, @ANYBLOB="00000000000000002e2f66696c6530004f3373c2f9c62dd629892577ceb0da43aa021b9f067f2c0d1cf013c370092fc4b673b3f47e686d7095f4f90732ad48aa233aaf89ea32"]) fsetxattr$trusted_overlay_redirect(r5, &(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x8, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0xdf}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r9 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r7, r8, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r9, 0x0, &(0x7f0000000440)={0x0, 0x0, 0x0}}, 0x0) io_uring_enter(r6, 0x58ab, 0x0, 0x0, 0x0, 0x0) dup2(r9, r6) ioctl$INCFS_IOC_PERMIT_FILL(0xffffffffffffffff, 0x40046721, &(0x7f0000000080)={r6}) ioctl$EXT4_IOC_MOVE_EXT(r4, 0xc028660f, &(0x7f00000000c0)={0x0, r1, 0x7fff, 0x6, 0x2, 0x2}) perf_event_open(&(0x7f0000000000)={0x6, 0x80, 0x5, 0x1, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xffffffff81000000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x2c}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendmsg$nl_xfrm(r4, &(0x7f0000000580)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f0000000340)={&(0x7f0000000480)=ANY=[@ANYBLOB="c00000001c00000427bd7000fddbdf253c71001400706f6c79313330352d61726d000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002801000000000000b0d0b920a20cdacb1b269b1c7bb30d4bfc5e08d7a64b5efdf3252944c95fddafa3c59ed4bc00000024000900040000000000000001000100000000007f708cec1394ab39000000000000001f0000000000000014000e00ff020000000000000000000000000001040000"], 0xc0}, 0x1, 0x0, 0x0, 0x4000080}, 0x0) 03:18:45 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:45 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:18:45 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) wait4(r0, &(0x7f0000000140), 0x8, 0x0) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) waitid(0x1, r2, &(0x7f0000000000), 0x4, &(0x7f0000000080)) 03:18:45 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:01 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:01 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:01 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, 0x0, 0x0, 0x200000048) 03:19:01 executing program 5: r0 = fork() r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) move_pages(r0, 0x1, &(0x7f0000000080)=[&(0x7f0000ffe000/0x1000)=nil], &(0x7f0000000100)=[0x3f], &(0x7f0000000140)=[0x0, 0x0, 0x0, 0x0, 0x0], 0x4) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) tkill(r1, 0x1e) connect$inet(r3, &(0x7f0000000000)={0x2, 0x4e23, @dev={0xac, 0x14, 0x14, 0x1}}, 0x10) ptrace(0x10, r0) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:19:01 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:01 executing program 6: syz_emit_ethernet(0x56, &(0x7f0000000080)={@random="07af43ba2470", @remote, @void, {@canfd={0xd, {{}, 0x0, 0x0, 0x0, 0x0, "7bc74f84dbc157914cd8c864a1bea9a4d30d9eedbf84c7959dd76445502e8debf42a1f820f5fe25e762e614b3d9ae47ca38e6862065da5e5550f0dfc6eba6e8f"}}}}, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000040), 0x8401, 0x0) ioctl$TUNSETQUEUE(r0, 0x400454ca, &(0x7f00000000c0)={'ip6gretap0\x00'}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r1, 0x84009422, &(0x7f0000001200)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct}}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$KDDISABIO(r2, 0x4b37) write$tun(r0, &(0x7f0000000200)={@void, @val={0x0, 0x4, 0x6, 0x6}, @mpls={[], @ipv4=@udp={{0x5, 0x4, 0x0, 0x0, 0xfc0, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @loopback}, {0x0, 0x0, 0xfac, 0x0, @opaque="17eac1677e6a127d95833eab3e1281910ba6a006ba6f5be7038980434f2336fe62ca18b6f649efc856cdf1859317063b4b3f5ba18f76adf2af93b1db6f8da99666860252c3d0f5d3321e604c227f7bac7b2f962f81969c98c61fc0adcaa927dcf8eb8a334a253f52766a5158236f9e41842873510ddc9c8c86115a75923de937de684a77a423cd6bba002d505f23fdd27403a1c9437d2f80418d1959b7bf3c23084716f1e38c591f7507080967337057e0af5fc00c378e55dc7d56d3e34fa53f79f6f1ea6142516a363ec5919f03b585f7ba97795539212ee8fc65a808786c62c3d866decd31723de22e6f7b3b11f48740dac5d9e0c7e53dd1040eb30b4620e6ec58e2f525eadcb1795c74d98cfe7baea5a87f504cb703537c72d28fbd4ef930f77972712cd51f503dfb67e57924152fbb34c7914e0ebabf8ad625f43705973909a686ac305bb4565fe28eb017cdf95e193287ab5fcf6f49323ed951ea757f73b1b14df075112781b86fa265df06feb4ea91607ae3ea873a571b4ebcfe5aa39281cbcc61ba2b3df457774054c2e508b6965d4077768ce4f2bc5d1168515be5ae932d514229ebf97350977f93a1c9ee23167316cbdfbebc2b4fd32b73d118af80e428d5d738eae95e6ae92e7ebeacf711c3b8f6c7e887dda26e0fba616061f99ac2bd671cb0ea08dad8a67150b33ba6e43640dcf0053ebe702ef786bd2e4c2b471071e947102402762339ab968499b1239f83427cd9be278860f5de9bb61f0f8aa2e4f2eb09c655ef8da88203f2ebbc44be6c6e966d1fafa04279f454a808d0bce5fecd183f8d43b0c5de5deeb10f9a4c9c5c4d365818a5d3d24b408bf55fbb1149db9a0616714c05cc71ea18646b078b1951b70860d1f82b0b39b2f2891605617f024857c3d2b2de0848a1e2d30495eed1dd6d5bd7681eed880852b0e16c7c6f3c98af03476c6017101ca933e7cc0860de295cd2d9c684c09311454a3dc9a6e60ea1a760f11f103295a12c4ee26f5934a95779e3b3d577706fc55ec0bca8e4d57a0d2f9aebb6f398a39c5f1a845e336d9d6487aa9ae06b4967f200280fef5fae2c4c32bf7d5f5d33783700edf09ea30cf77031f67e9e7adff37a0d8fe52ad92b1a906da4be2b295ec626867d9f6ba406443a5e47252af53eebf3508b7b5f4e7f1c254b3bc8e05d92cfb2f530669c8f1096abd7aee024cb15b4d4916935d2f587a57f51732034c91e304624cd89700d61b9c82ce7bd19c5c8789e00a7665d9cfe048cc3e4dd7f223626731e2c169e45c195469496657d913db42e3dd8e76b3d9f95588a9db68cbe7dcf16b86a7ddbca95a1c4440fd2b6b59255ea6e93a96640ba122c1ad2e300483c2f357725503c7d90776f1b8a4b7959674ee35d2aa98602db0075b9340ff0cacee7af1921a6c55f7a33ba84a627cfa8aff5b404b075690cc69beea6b1969453bce1e786a1f2fd1276224218127d398aad07a4aad205a01e8834cd476ae167fde5c922f8cb3cdd3b9ce31058562b9ccd986d8187e7df990566c4ab570f322d05cee45c4303c6224384c0f816517986518c89556f237c92e3a08280f2e8d3e39bef4f606a1502e6f6940ae8fc2b3248bc2a140ee2daec99fab045abb435ae13085270faa2f39323a25a6b732331048d1f65af1ac8c635e75a2bbf635fd324a92d571c121cefe782b7dafbe28fe2b65c6090c810a1aec939ec13713ccb5a801ebc82044002d3ffb1f15a0bc9347aa4dc2c5476e227003b569efc93c0c6df5cfe5762b0efc6312f3f74d4b86dd1909c2ddd52d63a5ffb8e22349b13e3becc1387e7b9cc9fe8eb7d7ecaebf0f8c180771a54e7cd2632c46a99e32117c9a309318e6b204f34f38c415fd4c7e0aeb0fb4059d86cab28e3b57420b3b5aa13ab430c1f357034cc9b0b461207a3cb4c55f1ef9d776cc0e58552f326d170d1f3b893b0d7bac9c38a4260c11f9edb10b47770864ec28f695cef503fdb121025778cbb565ba682509b8c824690a03eeba4f3d960a351f445c0851e52e1a3bf80b6aeec11611fef17a54b2e62c4f7f1d6961240f8efbfe22bae7b51c2dd095d5a4d55af167f7b90d7eddd2b1ed79aa6dc9d23887446e7342005e768319baff6e6cfad12f9c61252c7940f3d9f8017334327562c5dee3b0c90eec8ae9c6ddf092c420b881d5baaad698fa5ddd758b8d66057f29082c81a3da33a339152bd38dc170acaa480c057831c444c8200e82a5b903353ef828bf6ba04ad5f9c13443ad43d99e2bfeb0b28c01cc5498a7bd39be7702ebad212b5ce2b24387c107553d9a29272fdeb854359585447877850069cf3b2e90636cd3a84c26d6d5c4800e0a8d2a8581f58d883338bb162282b2e7b78f6207dceb85724f31303d7836b1b4bf765ea42b325076572365188c44c40966564b89607287263eea84486c8c7c146657a72c87ee52393de0e4296c37e38b8721345567988f8d3aa8f9fbac8c9c51988df5290d3d19c7d98572fc3f87a8bd3f61b690900b19f192bc26d8f5b4424faabd697a3fa7bd58b45581eacddb0305448daecbc24c1e47dec73bd0b3e6f16c46c2a122bb273af3f4a1e7da60e3242441744a64c846e81ad14cd66434587d99ee5bd1c5712b0edd9eea6a9cade8edb8718f3420e297fecc95dfffa7bc1d8adaf6eafca2efbcd59fa6f9bca0c24fa8f403eca9a53f27506da2a277f860bf2113427b4bc56f338c4385ad4f761fa9ea7d5a7888158535fb2b0f0deb395179c4ce131220accc0dbd78d9428e09fe3c97d22efc2b13f34a3c37ed2321cd6dbb77311073757702ab7ff2d2db23387e789e75f21752ee9390533e523486b31e6035a4ac8978bd111d0e39f56fa2b2b3d0e5a6657738445693475ee71de18b5e14b5c2f9276d118f51213bf084367b8bebd081ceb826da9e3f26a956d710699fe9f8d3ab1a228426c3b40600ec3609a365c46b06b49c736b427b996736b23650e3fcef23bfe13545f7e359300db627581e507f0d229e47383709e29e57e9571787bfcba9145364d9747da9776c68f9f5898306586cf07bdbe7d96733712d6fe9e76b7c71d56d565f872355d5d476ccb090cda3b90b8e70f4576c4baf35e8156fd0ee2e1aae52163183f6ada700ca3fd1f926fe7c9a151c49ed390a6b8b9615db0591c57c58134af2bbae71dd6267aa34f2cbd0f05ba215ea6f7f284f09b208fcfe7698f32cacd4d4211896771d5aa935d147fd241e9145a8a69f4d7b35ad2ae96585a52cb41b5376b7199e725c367dc0122e2c2934a0dd940687602674cc92f807f046d975e4bec8f068649a3af07ca183657ff4ef6f9a1ca640eebf0ad7e2964fc76ce90bdd99b0750a452eea22e1ce09a12c40da4071405fe9761566d6bbdb9a6dfb3c76accdfee59fbe381042b7221a8cf44957e015b0e7bc4c60b34d1cd0f6f5d9d9099fab9316ebde092b5b8e431e1bbcf0bc3a35ad47920492bc48bb152e2aac0f9ac0ffabf3350b2619c2960e5d995fbd4edf44be30508c8d96b8865d5cc42de9794d04c92f8cdff4183c685573f995a2260d426243294114456ad85956060e5c4c11014966a304d58e7fc1b2e76bd1117b32221adf4c17a45246ac22faaf6b0f54bb5d53561f689ff93f9b577147b49147d81e9da2fef6b1a419942937534e9f9ebba37904096a3b49bd3b0b967df26e3c54884f2c2eba9920ee1edcd72812097d9c80b72ae0364e51bd8bb37bf62cd41140343cf7c3f1630065810683ccaa43adfbdfd2719bd9fa4bd26297bc2c3cb363414b0d258ee6954879e2912afe380e6bec06d964fdcd28a6ccf082a551fc8e658cfafe1eb04304cb61ac723ffd4f6cd1e1702d80a0c20258d390c975ad37deadd1f936a5e5c3630f60ea1dbe19327410a3a8b92bd9c7f8f680be1fd0632c9ad9e518fca286c0512178165fc0f06b7b1f7c6cc995a90f159b021b691709cf19dabd1568b5a2523acda3df929115868f739173b6018cf3286e92289549f91bf52471053a8c508af4360f1a90f936c41ca492cada3c14cc69294e4e86e518539a31a49612f83c5873ed42ba39823f612f0b1138a957c295d7e3ca23f024d45c209ac3452756685b7bfb7c96e1491112d0ff74b6fb4696364d997e25a324afe5def48b8fd669d1b25eb6deda6a97f305a298120a3b658a292195c51b6606aaf3176e0608bd2a53acc8008953304a024af85c0f3d700853df2d37bd3fb6235c4e19bd5331d016f6b638e904af3b3760e9ae8b7bd0dec6642dd3a5b69304aaa2529a6426549075784a7b460351a505aa4c262a85883fd8708febacbfcb346b7de117a54519a45b9a3bbb6e46274993c30959dada59189db0c86c0d53a22d2bf0c2c55eb85fa4069e0a89d0f4ef856977d28532394a24c75c5493209e548e8a9ee8ea19e7050df37d3901c3f197949cf3649fbb42fdfcc5fd11e6e3aef591956340ec613d2c17f57f66f81e8fed1e9f9fe3a0ebf8169b46cf0844ab86d418390da26ab91e0269ea4d57da573da76cf6734f848a97f493efc40d0c0bf1ea70d89a6142071051366a20134a1fb4a1f28e18a460b3febd239d60a20e858c4ccf2676e66c38804c3543f9c6ef92b8b3b372cdaffc158d25a37be0e0f20b4bac5b6764244cefc678f66dad09664d8857be02d2a0be767b0fc99e32a0f14836960706f228b1a3257396e02b855b5d5931fb21aaeac30925629a452dac849f0f0f9cf6cba1b73bd4010efe5113d7dcf77150366e64e37907617b8dde96f10a9f04cfe89602bc7a5b25ecab87bd861b46ee258ee609f85676b0aaa6f292c413ef6abe9e5c0d3f4cc0aba3af1837df8ac33186a71bf2b47dd4e32d94e897d59a47253707bb951821e13292fbc1b33e53c617dd5efd1a56fd73e84e8eb6a67118a5c49c754a0d812920baecc03837ea4ec62b7ca049b97c534fc9b8f90ff8071433a4c6c6da494f23f916139bf8dc9d8b2c7d85e04957e5d0ff7b82cb8a37506dc86be86368ac947795639f753e4fa7c0e5b6345e6d16cc6efa01de7096de9f3b68fe5e58f5ea1ec47f282a1d4b0aa17a9b76e00951fa84b0e0a58beabf58cd088d0f55477fc4a8163af57990fb6685994e4a470de06a2d230cb2c7731c34c98e6ffc1c0298f8d909dda7e6e3d859dd046c340a6a24bc3d41f28afe6d3b735a35d67b59a3700daf4d702b1c44e2be010a3b38fe71a7b5e819a5d94964678445332cf06d7779e1417ccd88f9bb9f7278ca89cc9ebeea40d7416c05f9ff5054d3ccb844a26c47d7344e0281dbcbb7b86a72b04a518fe9d9b8c4271d70e9e21f2b894457c0efe1261ab97f57bf285008169701423466aa8b35373a845cd2943d88146f34a68392a400f3e35965c013549e8e0525526ba2ed273c6c294353723a5ba9bb569ececfaf1ddcc0206c0e93d0ee53dd5b7c770d669e0d8192c59abf59802dc76aad56efbe3304fd15e975a1aeeb85cc308222f76bda254bde616a81fd61c135a9a1bb223d59e39c0310747c827251e61dfeeea3576f4419a7462984c992039a634b0c92e66f62b5896b29f286c0b377c1acf48e3306d4b01a7049e1774d0019d82fba135ee1cc1aa4d7aa884f513ca48d36cbec5d6a58ee4916d842808d07df49a524c196bb226758b171acd6702abaddc39866402dbafead38de6"}}}}, 0xfca) 03:19:01 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) 03:19:01 executing program 4: mmap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x11, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xc0}}, './file1\x00'}) r1 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0xfd, 0x0, 0x0, 0x5a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x1, 0x200}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x200000000}, 0x0, 0x2000000000004, r0, 0x0) mkdirat(0xffffffffffffffff, 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000440)) close(r1) execveat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000080)) 03:19:01 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:16 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:16 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'syz_tun\x00', &(0x7f0000000100)=@ethtool_link_settings={0x38}}) r1 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup/syz1\x00', 0x200002, 0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) sendfile(r1, r2, &(0x7f0000000040)=0xb4, 0x1) 03:19:16 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) 03:19:16 executing program 5: r0 = fork() ptrace(0x10, r0) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000000c0)={0x0}, &(0x7f0000000100)=0xc) wait4(r1, &(0x7f0000000140), 0x8, &(0x7f0000000180)) r2 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r2, 0x40089416, &(0x7f0000000240)) waitid(0x1, r0, &(0x7f0000000600), 0x3, &(0x7f0000000000)) 03:19:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, 0x0, 0x0, 0x200000048) 03:19:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:16 executing program 6: ioctl$F2FS_IOC_START_ATOMIC_WRITE(0xffffffffffffffff, 0xf501, 0x0) pidfd_send_signal(0xffffffffffffffff, 0x10, &(0x7f0000000100)={0x28}, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000080)={0x0, 0x2}) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) stat(&(0x7f0000000000)='./file0\x00', &(0x7f0000001c00)) ioctl$sock_bt_hci(r0, 0x800448d4, &(0x7f0000000080)) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) write(r1, &(0x7f0000000500)="348d5ed85cdd15381c62a174ab7f0433ffaf2744e150ac76a031ef8424b53abfbf20d1a2967a3f862eb1c61efe7762e4b8619b5d", 0x34) syz_io_uring_complete(0x0) timerfd_settime(0xffffffffffffffff, 0x3, &(0x7f00000000c0), 0x0) ioctl$SG_IO(0xffffffffffffffff, 0x401070cd, 0x0) unshare(0x48020200) 03:19:16 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:16 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000140)={'wlan0\x00', &(0x7f0000000040)=ANY=[@ANYBLOB="3100000000000000000000000000000000000000e0000001ac1414aa00000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000aaaaaaaaaabb000000000000000000000000ff02000000000000000000000000000100000000000000000000ffffac01000000000000000000001f00000000000000000000000000bbbbbbbbbbbb00"/188]}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) preadv2(r1, &(0x7f0000000100)=[{&(0x7f0000000180)=""/90, 0x5a}, {&(0x7f0000000200)=""/4096, 0x1000}, {&(0x7f0000001200)=""/218, 0xda}], 0x3, 0xffffffff, 0x0, 0x8) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) fsync(r1) 03:19:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x0) 03:19:16 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) move_pages(r2, 0x5, &(0x7f0000000000)=[&(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x2000)=nil, &(0x7f0000fff000/0x1000)=nil, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000fff000/0x1000)=nil], &(0x7f0000000040)=[0x8], &(0x7f0000000080)=[0x0, 0x0], 0x6) 03:19:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:16 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x0) 03:19:16 executing program 5: r0 = fork() ptrace(0x4208, r0) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:19:16 executing program 4: sendmsg$NL80211_CMD_TRIGGER_SCAN(0xffffffffffffffff, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="17d2f871c4a1c3ddc245db", @ANYRES16=0x0, @ANYBLOB="200029bd7000ffdbdf252100000008000300", @ANYRES32=0x0, @ANYBLOB="6d34439abefb4235f7b217c7607fc9e30c0099001f0000004c000000080077030500000011002a0025030b0106c672060303150303030000000400ff0f04ed18d100c2680b10bfda6074"], 0x48}, 0x1, 0x0, 0x0, 0x8080}, 0x80) perf_event_open(&(0x7f0000000480)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000340)='limits\x00') r0 = syz_io_uring_setup(0x3a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r3 = socket$inet6_udplite(0xa, 0x2, 0x88) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_RECVMSG={0xa, 0x0, 0x0, r3, 0x0, &(0x7f0000000440)={&(0x7f0000000240)=@hci, 0x80, 0x0}}, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x100000e, 0x13, r0, 0x0) r4 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x2000)=nil, 0x2000, 0xf, 0x13, r0, 0x8000000) clock_gettime(0x0, &(0x7f0000001940)) syz_io_uring_submit(r4, r2, &(0x7f00000002c0)=@IORING_OP_READ=@pass_buffer={0x16, 0x4, 0x0, @fd, 0x0, 0x0}, 0x80000001) r5 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) dup2(r5, r3) io_uring_enter(r0, 0x58ab, 0x0, 0x0, 0x0, 0x0) 03:19:33 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:33 executing program 4: r0 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000600)={0xa, 0x0, 0x0, @dev, 0x3}, 0x1c) creat(&(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x2, 0x0, 0xffffffffffffffff, 0x0, &(0x7f00000003c0), 0x0, 0x40000000}, 0x100004) setsockopt$inet6_opts(r0, 0x29, 0x3b, &(0x7f0000000080)=@fragment={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x66}, 0x8) r1 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000640)={0x0, "b2aed395e5a8719263c37bf401066051"}) socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setxattr$trusted_overlay_upper(&(0x7f0000000040)='./cgroup/cgroup.procs\x00', &(0x7f00000000c0), &(0x7f0000000200)={0x0, 0xfb, 0xeb, 0x1, 0x1, "0595a6d71777b742fd54887c3342fd98", "efdaee080dd11869cb185a094dc145536311c26b8d2e79d0f3f7bc8895f7aca83c2526fcf3825360ed319a7f52274718e359395d4132601133c6d0291b68097f39bebc01fbda7ee6b26003180df22434b7fe4dfba9f3f457481aa1ba0464b0a5f2ad54e41938ef65eca3bb1411d3c29deee8848fc12b7bbfe1ce7f2e846409ee8539b00b7af0c8c4f779259bd9d81d1c4732204efd89f9a6b3f0d9d917606b4f66662b39cae68b9f79130a7d0afbd1f31fb9f772210fc31c8a52f7f6b8214adebc730df14e3d0fe5345a89c7d04be1ca7b9c603e0630"}, 0xeb, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x400000000000070, 0x0) 03:19:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x0) 03:19:33 executing program 6: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) bind$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x81, @none, 0x0, 0x1}, 0xe) setsockopt$SO_BINDTODEVICE_wg(r0, 0x1, 0x19, &(0x7f0000000040)='wg2\x00', 0x4) 03:19:33 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) 03:19:33 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) r5 = getpid() r6 = fcntl$getown(r4, 0x9) r7 = openat(0xffffffffffffffff, &(0x7f00000004c0)='./file0\x00', 0x8400, 0x130) perf_event_open(&(0x7f0000000440)={0x4, 0x80, 0x2c, 0xbe, 0x67, 0x7, 0x0, 0x6, 0x106, 0x6, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x4, @perf_config_ext={0x7f, 0x73}, 0x82a1, 0x9, 0xffff746f, 0x0, 0xffff, 0x1777, 0x1151, 0x0, 0x7f, 0x0, 0xfffffffffffffffd}, r6, 0x2, r7, 0x0) r8 = getpgid(0x0) r9 = epoll_create(0x1) r10 = socket$inet_tcp(0x2, 0x1, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000001c0), 0x6e, &(0x7f0000000280)=[{&(0x7f0000000000)=""/39, 0x27}, {&(0x7f0000000240)=""/38, 0x26}], 0x2, &(0x7f00000002c0)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000000000000010000000100000000000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000f71b000000000000150100000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x130}, 0x10000) prctl$PR_SCHED_CORE(0x3e, 0x4, r11, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r9, 0x1, r10, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r5, r8, 0x7, r9, &(0x7f0000000040)={r9, r10}) waitid(0x1, r8, &(0x7f0000000080), 0x8, &(0x7f0000000100)) 03:19:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:33 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_int(r0, 0x11, 0x66, &(0x7f0000000000)=0xffff, 0x4) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000380)={'sit0\x00', &(0x7f0000000300)={'syztnl1\x00', 0x0, 0x2f, 0x80, 0x88, 0xe6c, 0x0, @remote, @mcast1, 0x7, 0x700, 0xff, 0x6}}) ioctl$sock_ipv6_tunnel_SIOCDEL6RD(r0, 0x89fa, &(0x7f0000000440)={'ip6tnl0\x00', &(0x7f00000003c0)={'ip6gre0\x00', r1, 0x2f, 0x1f, 0x2b, 0x2, 0x20, @dev={0xfe, 0x80, '\x00', 0x3a}, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, 0x7800, 0x7820, 0x81, 0x8}}) sendto(0xffffffffffffffff, &(0x7f0000000180)="0909bf5637f9861b0fcf664920aa124366a073c9effc3c2d037d34987d9d5f47aa221ed4a8ee144915945878570c4b", 0x2f, 0x4, &(0x7f0000000200)=@l2tp={0x2, 0x0, @multicast1, 0x1}, 0x80) connect$inet6(r0, &(0x7f0000000540)={0xa, 0x0, 0x0, @dev, 0x2}, 0x1c) connect$inet6(r0, &(0x7f0000000280)={0xa, 0x4e20, 0xfffffffd, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000080)=0x29eb, 0x4) openat(0xffffffffffffff9c, &(0x7f00000002c0)='./file0\x00', 0x14d100, 0x101) pipe(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendmsg$inet6(r0, &(0x7f0000000500)={0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f0000000580)="217359adebe62f1d6750247dcff2f085cca5973dc883005f5dce9a2a2839a6b33905981f727d7f15200f7cac626db75ba24bf56f50c092eb9290c55a828b78bf353c861ecadb46a3025fe1d7fb5bb9e15297bbbc3cce48c3c847bfc9666ccdc04896bc2c4f7b5a0f66cb07aa7199ce9b002c3cce71004a78116c5af3fb081c1e06c776a710ca73b9dbc6aa25e68a4e20ebd5a3b1d55611c002afec8f7ff1e5fd95e87d9c6e1941283a2f7d3af91e29580ab59048853338ee8f4c5f1c29780fb55e44", 0xc2}], 0x1}, 0x1) ioctl$sock_SIOCGIFCONF(r3, 0x8912, &(0x7f00000001c0)=@req={0x28, &(0x7f0000000140)={'rose0\x00', @ifru_map}}) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) ioctl$sock_inet6_SIOCDIFADDR(r5, 0x8936, &(0x7f0000000480)={@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0x3, r2}) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x46e2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x4, @perf_bp={&(0x7f0000000100), 0x2}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmmsg$inet6(r0, &(0x7f0000004d00), 0x2f, 0x20040000) getsockopt$IP6T_SO_GET_REVISION_TARGET(0xffffffffffffffff, 0x29, 0x45, &(0x7f0000000680)={'IDLETIMER\x00'}, &(0x7f00000006c0)=0x1e) 03:19:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 1) 03:19:33 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f0000000000)) 03:19:33 executing program 4: r0 = socket$inet(0x2, 0x80000, 0xffffffff) connect$inet(r0, &(0x7f0000000140)={0x2, 0x0, @local}, 0x10) connect$inet6(0xffffffffffffffff, &(0x7f0000000240)={0xa, 0x0, 0x0, @private2}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000007400)=[{{0x0, 0x0, &(0x7f0000000080)=[{0x0}, {&(0x7f0000000240)=""/84, 0x54}], 0x2}}], 0x1, 0x0, 0x0) sendmmsg$inet(r0, &(0x7f0000000000), 0x400000d, 0x0) 03:19:33 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 761.599500] FAULT_INJECTION: forcing a failure. [ 761.599500] name failslab, interval 1, probability 0, space 0, times 1 [ 761.602428] CPU: 1 PID: 11194 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 761.603900] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 761.605634] Call Trace: [ 761.606197] dump_stack+0x107/0x167 [ 761.606991] should_fail.cold+0x5/0xa [ 761.607784] ? kvmalloc_node+0x119/0x170 [ 761.608632] should_failslab+0x5/0x20 [ 761.609396] __kmalloc_node+0x76/0x420 [ 761.610197] ? __lock_acquire+0xbb1/0x5b00 [ 761.611068] kvmalloc_node+0x119/0x170 [ 761.611854] seq_read_iter+0x9d6/0x12b0 [ 761.612664] ? asm_sysvec_apic_timer_interrupt+0x12/0x20 [ 761.613765] proc_reg_read_iter+0x20a/0x2e0 [ 761.614653] new_sync_read+0x424/0x6f0 [ 761.615435] ? ksys_lseek+0x1b0/0x1b0 [ 761.616202] ? _cond_resched+0x12/0x80 [ 761.616987] ? avc_policy_seqno+0x9/0x70 [ 761.617829] ? selinux_file_permission+0x92/0x520 [ 761.618858] vfs_read+0x457/0x580 [ 761.619607] __x64_sys_pread64+0x201/0x260 [ 761.620497] ? ksys_pread64+0x1b0/0x1b0 [ 761.621324] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 761.622428] ? syscall_enter_from_user_mode+0x1d/0x50 [ 761.623519] do_syscall_64+0x33/0x40 [ 761.624310] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 761.625364] RIP: 0033:0x7f8fd31c2b19 [ 761.626155] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 761.629926] RSP: 002b:00007f8fd0738188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 761.631491] RAX: ffffffffffffffda RBX: 00007f8fd32d5f60 RCX: 00007f8fd31c2b19 [ 761.632945] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000007 [ 761.634398] RBP: 00007f8fd07381d0 R08: 0000000000000000 R09: 0000000000000000 [ 761.635868] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 761.637321] R13: 00007ffeb616db0f R14: 00007f8fd0738300 R15: 0000000000022000 03:19:33 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x1, 0xfffffffffffffffc}) r2 = epoll_create(0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000000040)={r2, r3}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x660, 0x1a, 0x20, 0x70bd25, 0x25dfdbfb, {0x18}, [@typed={0x8, 0x28, 0x0, 0x0, @pid}, @nested={0x2b3, 0x3f, 0x0, 0x1, [@generic="3e91b53dc2dcdaf8935c996dc2e3b9b608aa755d83a23d362014b942d0255f4b6cafe9e2697937ffc86ef7651a5a056a695c035344", @generic, @generic="d0ad1d27e15dffbab8d11495839ceedd1fd1d69204841b32ed41d63be9e95016d7f5012d5366e529c7ee425f956756c88e49c3efc548ce8ccd4061814159967547d5229318ed3d7e1b4b0817c3461027c0b273398844cf4d54d1db353893ec19b7a2f9eaa97a0e7392c431ce964f7b93224e62c6ddff322874d4b5d31e966366f6f38ebec85441a592ec8853721ad7cb4624edef4ce2faeae4b8710f09b8401bdf864e4826eb093332c58a355cf350054a644b1570ab5b5929260ec006756ea62422486f9a7b51", @generic="0ff2b6b7c2ef0f447a03ab98c4b0b2090ae71ff6522ed1c6d7e41871", @generic="2f0005920efaeabc832bc99ff8b23c0cee03ea30578603d5bdcca80a8a19eab11966e9ab7e9ff4d0648cf7a35d", @generic="c19ee2651e01dbf111a73e63a6d9df013e49803759edc30d84ca297707356d8f4a217d95b5a2ce17da8ad2944d264479024a9c8c30bf85a14119367e8a4fe9cbcbedff8a10b01e0d42e55970c69397eaa41f1d672aae166b7a6824a9098f6b8282540e4a57e2ddd95d8fbfbd4925fa06bbe9848d32bfe92f464d0aa52d98b9cd8a5224e39b525d96c7c82d2d9bbcb51f2bbaaa70e55b8f2a58b573af342b4a0d804dff936b0325cedb84966f8be8daf7966772e2c02be14e62018676707bd1fbba35d2", @generic="90a851ae918cd0a5dc8e881a33c32d6cb6103b5f565c7a97f48be54298b25574cc2c8bac82bfc629bc6765f26b28c3b47a33b6483477f1515f16877e574a1b72547fc358c1363412281ea09c9676c2b76e9dd4ca5d470d1c3663a37b80a14b13309433e4159527f117d70981204503ad08e871dff43cf1507989726979b6aff78f33bf69fa947e4408bbe060709b78eed0efe4d5e9de8cf880d9c0e00806b840850b6da8bc8a8f"]}, @typed={0x8, 0x3f, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="51d966f7e2abb404d5a1166bf3c212100a015172fde91186fa61f33d5cff123223435fedbda8be0f3e4ee34f0ffe267330a26295a1b35dafac698608462621d5dd20c9dab7160dbd840da7ec9193eeb49541fa7486ba8a94ff9824eb04484c3d5f83864266aec9ba151a9f8c035bbf3178a11d2d1b2052e37525f9e19669d99d7c25e3b0c82c797b267a340f0c0b8199f9c7045afae5c5322987bb8cc9f0883575b9e2cec7c04a6563a90e8e9b36d0b3c0fc830d4864fd06dbf3b178cb07", @generic="1aea7e55dc0193ef5b14f855a4c8f4bfb70c577eda08c959c3c58e9d53e0e196223890b86bfabf23411762f47b4d09d5a0186e374bb070e1a22ed04ff48404c95b9ea94948d78858f047000000000000061a11d055f56371180595d3b6a618c81dec726b8d9b47ec687d282a41644d983b32ecd78303f05fabba9cba189831f7b8c72f566823e8c6840000009810a8f1423fc26f96313cd9b54fa9080a469372a4f2d232ba6e00000000", @generic="0715ad0a8f282a9ab60f10a816f617e94be708b90d78b83b9f029c532b9a2733b1f834fdb79db3d3478b53d400d6734d4d5c4be8f98001c394cc165d66bb4b30a8fc5b640368635c6042", @nested={0x1cb, 0x21, 0x0, 0x1, [@generic="380ee991dbd0b4f2891147a5306aaa238b4d81ed416aa7f8a865ef3987450cf1b5abf36a46adefce9e3aa3e26376240f81eeeb2c47b5d7d4cc239c", @generic, @generic="2ba5acd3f2a759c15dfebb79522ddc08b2d21cd735508757e06171a415eb01b42adf42fe11866e9496af1f815d717dd93557d27c9cd583f0234ec2395ba31275d058f8eb80acd72255c4101b5fceeea74289e0a9a32675b93a2613e50551fe34b6cf346c7f42c3d41642e7650959c696e751c0ef632cc1fa99ea64bd09b69c5a3d18a5b25c73a5c453d1f04ee02f4e965c69dd54693958ac4158e5c591a55148154100da8f8a6b73e5", @typed={0x8, 0x58, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x3d}}, @generic="fd7d6fd76a8ae84088f328b2de06e4b75ef19a5a08493018034656b23bec431c5251dce7272fd92230217c0278cd41666e8ec23106f854324748327e9946d8d07e71f874abb3deb0bfd4145483d0e50cc3152401aff43b491d72f6101d1a229cbfbe2a9bb13e19e11aa6ef0ef8f6cc97d76370fa690b4691d6ae1213fdab7b5270551b91795f77ff329beedba893efc3e5b2fa27bcd0a15c271f1faec5a917c62f9b7928761aa6678f664e2ff7d5a7f49828e73a0153f86aecdf5fd3d775e761ded4ba3e188e6e2547322697a9e13a9f4b9dc35f4e168b3ef64b89"]}, @typed={0x8, 0x74, 0x0, 0x0, @uid=r4}]}, 0x660}, 0x1, 0x0, 0x0, 0x4000800}, 0x8044) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x14, 0x16, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x14, 0x16, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4800) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') [ 776.266093] FAULT_INJECTION: forcing a failure. [ 776.266093] name failslab, interval 1, probability 0, space 0, times 0 03:19:48 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f0000000080)=0x1, 0x4) connect$inet(r0, &(0x7f0000000000)={0x2, 0x1, @remote}, 0x10) setsockopt$inet_tcp_TCP_REPAIR_OPTIONS(r0, 0x6, 0x16, &(0x7f0000001440)=[@timestamp, @sack_perm, @window={0x3, 0x0, 0x6}, @mss, @mss={0x2, 0x4664bd82}, @window, @timestamp, @window={0x3, 0x7, 0x101}], 0x8) 03:19:48 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x401c5820, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x1, 0x1}) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000180)={0x0, 0x1, 0x1, 0xfffffffffffffffc}) r2 = epoll_create(0x1) r3 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r3, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, r2, &(0x7f0000000040)={r2, r3}) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) sendmsg$nl_generic(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000200)={&(0x7f0000000340)={0x660, 0x1a, 0x20, 0x70bd25, 0x25dfdbfb, {0x18}, [@typed={0x8, 0x28, 0x0, 0x0, @pid}, @nested={0x2b3, 0x3f, 0x0, 0x1, [@generic="3e91b53dc2dcdaf8935c996dc2e3b9b608aa755d83a23d362014b942d0255f4b6cafe9e2697937ffc86ef7651a5a056a695c035344", @generic, @generic="d0ad1d27e15dffbab8d11495839ceedd1fd1d69204841b32ed41d63be9e95016d7f5012d5366e529c7ee425f956756c88e49c3efc548ce8ccd4061814159967547d5229318ed3d7e1b4b0817c3461027c0b273398844cf4d54d1db353893ec19b7a2f9eaa97a0e7392c431ce964f7b93224e62c6ddff322874d4b5d31e966366f6f38ebec85441a592ec8853721ad7cb4624edef4ce2faeae4b8710f09b8401bdf864e4826eb093332c58a355cf350054a644b1570ab5b5929260ec006756ea62422486f9a7b51", @generic="0ff2b6b7c2ef0f447a03ab98c4b0b2090ae71ff6522ed1c6d7e41871", @generic="2f0005920efaeabc832bc99ff8b23c0cee03ea30578603d5bdcca80a8a19eab11966e9ab7e9ff4d0648cf7a35d", @generic="c19ee2651e01dbf111a73e63a6d9df013e49803759edc30d84ca297707356d8f4a217d95b5a2ce17da8ad2944d264479024a9c8c30bf85a14119367e8a4fe9cbcbedff8a10b01e0d42e55970c69397eaa41f1d672aae166b7a6824a9098f6b8282540e4a57e2ddd95d8fbfbd4925fa06bbe9848d32bfe92f464d0aa52d98b9cd8a5224e39b525d96c7c82d2d9bbcb51f2bbaaa70e55b8f2a58b573af342b4a0d804dff936b0325cedb84966f8be8daf7966772e2c02be14e62018676707bd1fbba35d2", @generic="90a851ae918cd0a5dc8e881a33c32d6cb6103b5f565c7a97f48be54298b25574cc2c8bac82bfc629bc6765f26b28c3b47a33b6483477f1515f16877e574a1b72547fc358c1363412281ea09c9676c2b76e9dd4ca5d470d1c3663a37b80a14b13309433e4159527f117d70981204503ad08e871dff43cf1507989726979b6aff78f33bf69fa947e4408bbe060709b78eed0efe4d5e9de8cf880d9c0e00806b840850b6da8bc8a8f"]}, @typed={0x8, 0x3f, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x0, 0x0}}, @generic="51d966f7e2abb404d5a1166bf3c212100a015172fde91186fa61f33d5cff123223435fedbda8be0f3e4ee34f0ffe267330a26295a1b35dafac698608462621d5dd20c9dab7160dbd840da7ec9193eeb49541fa7486ba8a94ff9824eb04484c3d5f83864266aec9ba151a9f8c035bbf3178a11d2d1b2052e37525f9e19669d99d7c25e3b0c82c797b267a340f0c0b8199f9c7045afae5c5322987bb8cc9f0883575b9e2cec7c04a6563a90e8e9b36d0b3c0fc830d4864fd06dbf3b178cb07", @generic="1aea7e55dc0193ef5b14f855a4c8f4bfb70c577eda08c959c3c58e9d53e0e196223890b86bfabf23411762f47b4d09d5a0186e374bb070e1a22ed04ff48404c95b9ea94948d78858f047000000000000061a11d055f56371180595d3b6a618c81dec726b8d9b47ec687d282a41644d983b32ecd78303f05fabba9cba189831f7b8c72f566823e8c6840000009810a8f1423fc26f96313cd9b54fa9080a469372a4f2d232ba6e00000000", @generic="0715ad0a8f282a9ab60f10a816f617e94be708b90d78b83b9f029c532b9a2733b1f834fdb79db3d3478b53d400d6734d4d5c4be8f98001c394cc165d66bb4b30a8fc5b640368635c6042", @nested={0x1cb, 0x21, 0x0, 0x1, [@generic="380ee991dbd0b4f2891147a5306aaa238b4d81ed416aa7f8a865ef3987450cf1b5abf36a46adefce9e3aa3e26376240f81eeeb2c47b5d7d4cc239c", @generic, @generic="2ba5acd3f2a759c15dfebb79522ddc08b2d21cd735508757e06171a415eb01b42adf42fe11866e9496af1f815d717dd93557d27c9cd583f0234ec2395ba31275d058f8eb80acd72255c4101b5fceeea74289e0a9a32675b93a2613e50551fe34b6cf346c7f42c3d41642e7650959c696e751c0ef632cc1fa99ea64bd09b69c5a3d18a5b25c73a5c453d1f04ee02f4e965c69dd54693958ac4158e5c591a55148154100da8f8a6b73e5", @typed={0x8, 0x58, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x3d}}, @generic="fd7d6fd76a8ae84088f328b2de06e4b75ef19a5a08493018034656b23bec431c5251dce7272fd92230217c0278cd41666e8ec23106f854324748327e9946d8d07e71f874abb3deb0bfd4145483d0e50cc3152401aff43b491d72f6101d1a229cbfbe2a9bb13e19e11aa6ef0ef8f6cc97d76370fa690b4691d6ae1213fdab7b5270551b91795f77ff329beedba893efc3e5b2fa27bcd0a15c271f1faec5a917c62f9b7928761aa6678f664e2ff7d5a7f49828e73a0153f86aecdf5fd3d775e761ded4ba3e188e6e2547322697a9e13a9f4b9dc35f4e168b3ef64b89"]}, @typed={0x8, 0x74, 0x0, 0x0, @uid=r4}]}, 0x660}, 0x1, 0x0, 0x0, 0x4000800}, 0x8044) sendmsg$nl_generic(r1, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x14, 0x16, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r5 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_generic(r5, &(0x7f0000000280)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x14, 0x16, 0xc21, 0x0, 0x0, {0xa}}, 0x14}}, 0x0) r6 = socket$netlink(0x10, 0x3, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, 0x0) perf_event_open(&(0x7f0000000040)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x2}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) sendmsg$NFT_BATCH(r6, &(0x7f00000002c0)={&(0x7f0000000100), 0xc, 0x0, 0x1, 0x0, 0x0, 0x8000}, 0x4800) syz_open_procfs(0x0, &(0x7f0000000280)='fd/4\x00') 03:19:48 executing program 5: r0 = fork() ptrace(0x10, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) write$cgroup_pid(r1, &(0x7f0000000000)=r0, 0x12) waitid(0x0, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) fcntl$setown(0xffffffffffffffff, 0x8, 0xffffffffffffffff) ioctl$sock_inet6_udp_SIOCINQ(r1, 0x541b, &(0x7f0000000040)) 03:19:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 2) 03:19:48 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:48 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 776.270226] CPU: 0 PID: 11329 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 776.270983] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 776.271852] Call Trace: [ 776.272148] dump_stack+0x107/0x167 [ 776.272536] should_fail.cold+0x5/0xa [ 776.272938] ? create_object.isra.0+0x3a/0xa20 [ 776.273419] ? create_object.isra.0+0x3a/0xa20 [ 776.273919] should_failslab+0x5/0x20 [ 776.274324] kmem_cache_alloc+0x5b/0x310 [ 776.274774] create_object.isra.0+0x3a/0xa20 [ 776.275252] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 776.275795] __kmalloc_node+0x1ae/0x420 [ 776.276233] ? __lock_acquire+0xbb1/0x5b00 [ 776.276712] kvmalloc_node+0x119/0x170 [ 776.277153] seq_read_iter+0x9d6/0x12b0 [ 776.277606] ? perf_trace_lock+0xac/0x490 [ 776.278072] ? SOFTIRQ_verbose+0x10/0x10 [ 776.278526] proc_reg_read_iter+0x20a/0x2e0 [ 776.279010] new_sync_read+0x424/0x6f0 [ 776.279444] ? ksys_lseek+0x1b0/0x1b0 [ 776.279875] ? _cond_resched+0x12/0x80 [ 776.280314] ? avc_policy_seqno+0x9/0x70 [ 776.280764] ? selinux_file_permission+0x92/0x520 [ 776.281309] vfs_read+0x457/0x580 [ 776.281696] __x64_sys_pread64+0x201/0x260 [ 776.282171] ? ksys_pread64+0x1b0/0x1b0 [ 776.282641] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 776.283239] ? syscall_enter_from_user_mode+0x1d/0x50 [ 776.283824] do_syscall_64+0x33/0x40 [ 776.284252] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 776.284826] RIP: 0033:0x7f8fd31c2b19 [ 776.285249] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 776.287309] RSP: 002b:00007f8fd0738188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 776.288156] RAX: ffffffffffffffda RBX: 00007f8fd32d5f60 RCX: 00007f8fd31c2b19 [ 776.288919] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000007 [ 776.289726] RBP: 00007f8fd07381d0 R08: 0000000000000000 R09: 0000000000000000 [ 776.290483] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 776.291305] R13: 00007ffeb616db0f R14: 00007f8fd0738300 R15: 0000000000022000 03:19:48 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:48 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:48 executing program 6: rt_sigaction(0x12, &(0x7f00000000c0)={0x0, 0x0, 0x0}, 0x0, 0x8, &(0x7f0000000100)) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x4000004}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_group_source_req(r0, 0x29, 0x2e, &(0x7f0000000000)={0x0, {{0xa, 0x0, 0x0, @mcast1={0xff, 0x5}}}, {{0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}}}}, 0x108) perf_event_open(&(0x7f00000001c0)={0x3, 0x80, 0x0, 0x1, 0x3f, 0x0, 0x0, 0x7ff, 0x20086, 0xd, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1000, 0x0, @perf_bp={&(0x7f0000000180), 0xa}, 0x400, 0x5, 0xdebe, 0x3, 0x495, 0x1, 0x3ff, 0x0, 0x2, 0x0, 0x6}, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x1) fsetxattr$security_selinux(0xffffffffffffffff, &(0x7f0000000000), &(0x7f0000000080)='system_u:object_r:syslogd_var_lib_t:s0\x00', 0x27, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) setsockopt$inet6_MCAST_MSFILTER(r2, 0x29, 0x30, &(0x7f0000000240)={0x1c, {{0xa, 0x4e24, 0x800, @ipv4={'\x00', '\xff\xff', @local}, 0x200000}}, 0x0, 0x9, [{{0xa, 0x4e22, 0x7, @remote, 0x5}}, {{0xa, 0x4e20, 0x5, @ipv4={'\x00', '\xff\xff', @dev={0xac, 0x14, 0x14, 0xa}}, 0x9}}, {{0xa, 0x4e22, 0x6fea, @private2={0xfc, 0x2, '\x00', 0x1}, 0x1}}, {{0xa, 0x4e24, 0x101, @mcast1, 0x200}}, {{0xa, 0x4e21, 0x6, @local, 0x7}}, {{0xa, 0x4e23, 0x8, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}, 0xfffff801}}, {{0xa, 0x4e20, 0x0, @rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x40}}, {{0xa, 0x4e21, 0x3, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, 0xfff}}, {{0xa, 0x4e20, 0xa2, @dev={0xfe, 0x80, '\x00', 0x2c}, 0x10000}}]}, 0x510) ioctl$RTC_WKALM_SET(0xffffffffffffffff, 0x4028700f, &(0x7f00000000c0)={0x1, 0x1, {0x0, 0x24, 0x1, 0x3, 0x2, 0xfe2d, 0x0, 0x1d, 0x1}}) acct(&(0x7f0000000040)='./file0\x00') unshare(0x48020200) 03:19:48 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:48 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:19:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) (fail_nth: 3) 03:19:48 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:19:48 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) r1 = fork() r2 = getpgid(r1) pidfd_open(r2, 0x0) 03:19:48 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 776.592372] FAULT_INJECTION: forcing a failure. [ 776.592372] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 776.594022] CPU: 0 PID: 11452 Comm: syz-executor.3 Not tainted 5.10.194 #1 [ 776.594800] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 776.595737] Call Trace: [ 776.596026] dump_stack+0x107/0x167 [ 776.596456] should_fail.cold+0x5/0xa [ 776.596900] _copy_to_user+0x2e/0x180 [ 776.597343] simple_read_from_buffer+0xcc/0x160 [ 776.597864] proc_fail_nth_read+0x198/0x230 [ 776.598359] ? proc_sessionid_read+0x230/0x230 [ 776.598869] ? security_file_permission+0x24e/0x570 [ 776.599443] ? perf_trace_initcall_start+0x101/0x380 [ 776.600000] ? proc_sessionid_read+0x230/0x230 [ 776.600506] vfs_read+0x228/0x580 [ 776.600891] ksys_read+0x12d/0x260 [ 776.601297] ? vfs_write+0xa70/0xa70 [ 776.601733] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 776.602333] ? syscall_enter_from_user_mode+0x1d/0x50 [ 776.602947] do_syscall_64+0x33/0x40 [ 776.603379] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 776.603971] RIP: 0033:0x7f8fd317569c [ 776.604397] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 776.606468] RSP: 002b:00007f8fd0738170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 776.607317] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007f8fd317569c [ 776.608132] RDX: 000000000000000f RSI: 00007f8fd07381e0 RDI: 0000000000000008 [ 776.608938] RBP: 00007f8fd07381d0 R08: 0000000000000000 R09: 0000000000000000 [ 776.609726] R10: 0000000200000048 R11: 0000000000000246 R12: 0000000000000001 [ 776.610554] R13: 00007ffeb616db0f R14: 00007f8fd0738300 R15: 0000000000022000 03:19:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:03 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:03 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:03 executing program 6: getpeername$inet(0xffffffffffffffff, &(0x7f0000000080)={0x2, 0x0, @multicast1}, &(0x7f00000000c0)=0x10) ioctl$AUTOFS_IOC_ASKUMOUNT(0xffffffffffffffff, 0x80049370, &(0x7f0000000140)) ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000180)=0xfffffffa) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCL_SCROLLCONSOLE(r0, 0x541c, &(0x7f0000000240)) ioctl$KDFONTOP_SET_DEF(r0, 0x4b72, &(0x7f0000000200)={0x2, 0x1, 0x1e, 0xd, 0x1ab, &(0x7f0000000280)="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"}) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r2, 0xc0189379, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$PIO_UNIMAP(r0, 0x4b67, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x0, 0x5}]}) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$TIOCGPGRP(r3, 0x540f, &(0x7f0000000100)) ioctl$TIOCCBRK(r0, 0x5428) 03:20:03 executing program 5: r0 = fork() r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000000)) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000000080)={r2, 0xfd, 0xe, 0x6}) ioctl$TIOCGPGRP(r2, 0x540f, &(0x7f00000000c0)) ptrace(0x10, r0) getpgid(r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:20:03 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:03 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:03 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:03 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:04 executing program 6: syz_emit_ethernet(0x3e, &(0x7f0000000300)={@local, @local, @void, {@ipv4={0x800, @icmp={{0x5, 0x4, 0x0, 0x0, 0x30, 0x0, 0x0, 0x0, 0x1, 0x0, @remote={0xac, 0x1c}, @local}, @parameter_prob={0x8, 0x0, 0x0, 0x0, 0x0, 0x0, {0x5, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @broadcast, @broadcast}}}}}}, 0x0) pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000000080)={0x6, 0xe0b, 0x2, 0xa8b0, 0x2, [0x6, 0x931f, 0x8]}) write$tun(r0, &(0x7f0000000040)={@void, @void, @arp=@ether_ipv4={0x1, 0x800, 0x6, 0x4, 0x4, @multicast, @multicast2, @dev={'\xaa\xaa\xaa\xaa\xaa', 0x30}, @broadcast}}, 0x1c) 03:20:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x20000293, 0x200000048) 03:20:04 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:04 executing program 5: r0 = fork() ptrace(0x4208, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:20:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x6) 03:20:04 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x10) 03:20:04 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:17 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:17 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x1, 0x0, &(0x7f0000000600), 0x40000000, &(0x7f00000003c0)) 03:20:17 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:17 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) socket$nl_xfrm(0x10, 0x3, 0x6) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:17 executing program 0: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x1a) 03:20:17 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:17 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x24) 03:20:17 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:17 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:17 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = getpid() clone3(&(0x7f0000000240)={0x41006200, &(0x7f0000000000), &(0x7f0000000040), &(0x7f0000000080), {0x25}, &(0x7f00000000c0)=""/50, 0x32, &(0x7f0000000100)=""/250, &(0x7f0000000200)=[r1, r0], 0x2}, 0x58) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:20:17 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:17 executing program 6: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:17 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:20:17 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:33 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000000), 0x8, &(0x7f00000003c0)) r1 = getpid() tkill(r1, 0x27) 03:20:33 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:33 executing program 6: r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x4, &(0x7f0000000440)=[{&(0x7f0000000040)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {0x0, 0x0, 0xffffffffdffffff8}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff46552e0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f00000001c0)=ANY=[@ANYBLOB='stripe=0x00000000008000']) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x24) 03:20:33 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:33 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x35) 03:20:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:20:33 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) sendmsg$nl_xfrm(0xffffffffffffffff, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 821.142627] EXT4-fs (loop6): mounted filesystem without journal. Opts: stripe=0x00000000008000,errors=continue 03:20:33 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:33 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:33 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:33 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = getpid() ptrace$setregset(0x4205, r1, 0x6, &(0x7f0000000300)={&(0x7f0000000680)="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", 0x1000}) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) r2 = fcntl$getown(0xffffffffffffffff, 0x9) waitid(0x1, r2, 0x0, 0x1, &(0x7f0000000000)) r3 = getpid() waitid(0x1, r3, &(0x7f00000000c0), 0x1000000, &(0x7f0000000140)) r4 = getpgrp(0x0) wait4(r4, &(0x7f0000000200), 0x80000000, &(0x7f0000000240)) 03:20:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:20:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x3c) 03:20:33 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:20:33 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:48 executing program 5: r0 = fork() ptrace(0x9, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:20:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:20:48 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:48 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x44) 03:20:48 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:48 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:48 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:48 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:20:48 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x48) 03:20:48 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:20:48 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:02 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:02 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:02 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:02 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:02 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:02 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x4c) 03:21:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:02 executing program 5: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_MGMT_C_PROTOCOLS(r0, &(0x7f0000000480)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0xa2c130383e5e9a37}, 0xc, &(0x7f0000000380)={&(0x7f00000004c0)=ANY=[@ANYBLOB="1c6d0500c938687bb9cf5f47e5a2001417016705cc25d2d6da06618b03a8251b746451bf6dfcfea604d5ddc30728c118db7d34004fd88e9f3e5b013867c37a44fdef967cc854ebc2af02990f00000000000000379efd291fac4a6af8f6f17bb379754ccd6ec654deda4e26749b93b66d1a8012f0c8605a09afa91944876b9aeaca860a7713d396481c1b3cb8936a1cf8ec29bf3b43932f8c04c075a626f1e8259d86abfc1d9101193e3345d4169e1a02bd51735212cb8bd446c7", @ANYRES16=0x0, @ANYBLOB="00022cbd7005fedbdf250700000006000b0000000000"], 0x1c}, 0x1, 0x0, 0x0, 0x8040}, 0x85) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x8100, 0x0) r2 = syz_genetlink_get_family_id$tipc(&(0x7f00000000c0), 0xffffffffffffffff) sendmsg$TIPC_CMD_SET_LINK_WINDOW(r1, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x40040140}, 0xc, &(0x7f0000000140)={&(0x7f0000000200)=ANY=[@ANYBLOB='0\x00\x00\x00', @ANYRES16=r2, @ANYBLOB="000326bd7000ffdbdf2501000000000000000941000000140018000008007564703a73797a3000000000f645105c6ba9e37ed745c4f6e68723ff75a700dcbd0fdbe6246845eadd6e47389032fa97e4eae99efe5ef9f396a23e814b4c591bf5c076138a6ea1a5863c859bbd89f3d6e939ad97bffc9aedd14ab11c11ac9013ff260de7d352d1ef9e865710d1d52f31829a61e471f8b4b7050000566c9ee1989c85655953e83f17cee26c0511551d407accedc2c96d2f0fca7bf779bdfc8132fc08390d6261e3630cb29def"], 0x30}, 0x1, 0x0, 0x0, 0x4040000}, 0x8880) sendmsg$TIPC_CMD_SET_LINK_PRI(0xffffffffffffffff, &(0x7f0000000100)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f00000000c0)={&(0x7f0000000040)={0x68, r2, 0x10, 0x70bd2c, 0x25dfdbfc, {{}, {}, {0x4c, 0x18, {0x9, @media='eth\x00'}}}, ["", "", "", "", ""]}, 0x68}, 0x1, 0x0, 0x0, 0x20}, 0x40005) sendmsg$IEEE802154_LLSEC_DEL_DEVKEY(0xffffffffffffffff, &(0x7f0000000700)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000005c0)={&(0x7f0000000680)={0x44, 0x0, 0x1, 0x70bd2a, 0x25dfdbfc, {}, [@IEEE802154_ATTR_LLSEC_KEY_SOURCE_SHORT={0x8, 0x2c, 0x5}, @IEEE802154_ATTR_PAN_ID={0x6, 0x6, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_NAME={0xa, 0x1, 'wpan3\x00'}, @IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x2}]}, 0x44}, 0x1, 0x0, 0x0, 0x40004080}, 0x40) r3 = fork() ptrace(0x10, r3) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:21:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:02 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:02 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:02 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) getpgid(r1) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:02 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) perf_event_open(&(0x7f0000001d80)={0x2, 0x80, 0x69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCSETSF2(0xffffffffffffffff, 0x402c542d, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x5, "f31afa00434ef9bab774bdca0d00"}) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000700), 0x0, 0x0) ioctl$TUNSETQUEUE(r1, 0x400454ca, &(0x7f0000000000)={'veth0_vlan\x00'}) r2 = socket$inet(0x2, 0xa, 0x0) ioctl$sock_TIOCINQ(0xffffffffffffffff, 0x541b, 0x0) dup3(r2, r1, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) r5 = getpgrp(r0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000002040)={{}, {}, [{0x2, 0x0, 0xee01}], {0x4, 0x2}, [{0x8, 0x1, 0xee01}, {0x8, 0x7, r6}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x4}], {}, {0x20, 0x1}}, 0x4c, 0x2) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r3, 0xc018937b, &(0x7f0000000000)=ANY=[@ANYBLOB="01000079d6411e0274ed51c5", @ANYRES32, @ANYRES32=0xee00, @ANYRES32=r6, @ANYBLOB='./file0\x00']) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f0000000040)={r5, r7}, 0xc) 03:21:02 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:02 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:02 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) r3 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() io_uring_register$IORING_REGISTER_FILES_UPDATE(r2, 0x6, &(0x7f0000001300)={0x0, 0x0, &(0x7f0000000200)=[r0, r3, r0, r0, r2, r3]}, 0x6) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat2(r4, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') r7 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) writev(r7, &(0x7f0000000180)=[{&(0x7f0000000080)="c8a9078354733b21c8f1ab9ccf8422bd64a7dd90695499c5793326b51d7d5fd151a6d93473b0013d6bf05285eb9c4ec7d0cb4e42", 0x34}, {&(0x7f0000000300)="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", 0x1000}, {&(0x7f00000000c0)="a16c0b1920380678c963f5963b3908159cc7178ed1274c011708c95d1cbfa7df2a46880c7ffa4272afb39acf3d1875c62dbee36d146cc846bdf5dd1f30", 0x3d}], 0x3) pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:18 executing program 5: r0 = fork() ptrace(0x10, r0) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) ptrace$setsig(0x4203, r0, 0x0, &(0x7f0000000000)={0x20, 0x200000, 0x4}) 03:21:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x9286, 0x0, 0x0, 0x7}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 6: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000240)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f00000003c0)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x3, &(0x7f0000001a40)=[{&(0x7f0000010000)="01434430303101004c494e55582020202020202020202020202020202020202020202020202020204344524f4d2020202020202020202020202020202020202020202020202020200000000000000000b8000000000000b80000000000000000000000000000000000000000000000000000000000000000010000010100000100080800180000000000001813000000000000000000001500000000220017", 0x9f, 0x8000}, {&(0x7f0000010600)="ff4344303031", 0x6, 0x8800}, {&(0x7f0000000140)="8800170000000000429d0008c612df11000000000800781dcfcd", 0x1a, 0xb800}], 0x0, &(0x7f0000000080)) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r1, 0x0) syz_mount_image$vfat(&(0x7f0000000040), &(0x7f00000000c0)='./file0\x00', 0x3, 0x2, &(0x7f0000000280)=[{&(0x7f0000000180)="e1439b45d608bd036c22648833b7d5c7fc5aaa4a0240984a653b4a0b404fa7d2a9a1b9ded88f6a48e0d29f8307702c3518a229bd7db3cebe478f11a2250ba9b0f34b19b69259334766972994d25e6d0c425d4571c6121cafeab70bf77894e4aebce22f5ce8f21a072cbae373d3c804d10ed6a5fe0098c251f3e32f0cd9144625e781b76e2f16499214b5455f4a79d630b0f2c8b2b1d41dc018b00c74d76686e58af48f2c0a8072ef9fe95a9e8e89819f046329f79b108c", 0xb7, 0x5}, {&(0x7f0000000240), 0x0, 0x6ae5}], 0x3000880, &(0x7f00000002c0)={[{@utf8}, {@fat=@check_normal}, {@numtail}, {@uni_xlate}, {@nonumtail}, {@nonumtail}, {@rodir}, {@nonumtail}], [{@fsmagic}, {@appraise_type}, {@smackfshat={'smackfshat', 0x3d, '.{$@^'}}, {@fowner_eq={'fowner', 0x3d, r1}}, {@appraise}, {@appraise_type}, {@smackfsroot={'smackfsroot', 0x3d, 'iso9660\x00'}}]}) 03:21:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x9286, 0x0, 0x0, 0x7}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) [ 866.508568] ISOFS: unable to read i-node block 46 [ 866.509738] isofs_fill_super: get root inode failed [ 866.569259] ISOFS: unable to read i-node block 46 [ 866.570457] isofs_fill_super: get root inode failed 03:21:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:18 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000040)=[{0x0, 0x0, 0x0, 0x7fffffff}]}) r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0xc, &(0x7f0000000000)=0x5, 0xff4d) r1 = socket$netlink(0x10, 0x3, 0x7) sendmsg$nl_generic(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)=ANY=[@ANYRESHEX], 0x18}, 0x1, 0x0, 0x0, 0x24000014}, 0x8000) getsockopt$sock_timeval(r0, 0x1, 0x0, &(0x7f0000000a80), &(0x7f0000000ac0)=0x10) read(r0, &(0x7f0000000140)=""/47, 0x2f) r2 = syz_mount_image$iso9660(&(0x7f0000000180), &(0x7f00000001c0)='./file0\x00', 0x9, 0x8, &(0x7f0000000640)=[{&(0x7f0000000200)="bdd07664bedcf513a06dc9cba76ce0f3f28293aba4f5bf056e099861433bd52e4f633432e51cd2860d7cfd0f1b17ac128f1239492f3658ff805d124d81104a767ab1d23e392dd016f25d4db5b1d4301cd5e0e2", 0x53, 0x3}, {&(0x7f0000000280)="dd2af824436087434c280afd02208c108cefda156f4a6f1e45bb35e035c0b97e023349e14b14cb1abeef60e0156500ebc1fddbc5950121115f92f65dd1284f7d255fbe77de3268cb1203db8345664f5aa673e248abefbcdd3be96b4804cc0db748096fd023450a21bef5c5207937", 0x6e, 0x3ff}, {&(0x7f0000000300)="8a0644b40b78856eac0592318b90bfa12462b142902b0fa0b1bbb07a1722d3bad194e7ea7efa3130d75511933a2c22f4367fe275b8f77c2263b19b76f5e76d1d1ac7c5fc7463ca61e50368a2f36c2bef842fab17846d98e6016c53566fe6a3c6a9a784699778abac4473f325c69d861611344cf0234fefd46400d9e67b07fdf5b410bd1bf951f91361dd1815eb84fe9b01444ecffacb8a46026df0ffea23e863bc03048e2c054ee5b6b011d1699730fe", 0xb0, 0x3608}, {&(0x7f00000003c0)="dee9408b55548019097309eb3d54b66391411e1ccb2f781d3f9afced98f7b13d03f33a6c3d3aca48d07f02ba1ad113fcac87c2a0df2ee9f2140dfd", 0x3b, 0x2}, {&(0x7f0000000400)="b10a086947d2bd7a4619f5509e49fe66d900ee4a3314d72b2d8c17dbd67ded4087df5ce6181d10426d9051dc493eb2f3ce91dc74028591ec2605c4", 0x3b, 0x3}, {&(0x7f0000000440)="859716e9fb4dae999a420ca6adfcc20c0fc45707cfebd2ef4f95adeaf60951d801bf527ef4e49ffc1860e1e31209e007", 0x30, 0x2ab}, {&(0x7f0000000480)="3592ebe2eafad72d34514e738fd6c8a67ce3cff4cfc5ce6c18ce99110cf267dd2d8585f5de77802eace9448eff3a93de63b02bd419724c97eee82060b213cbe3c6cc297d7c27433749d1758f7786620c289b4c2960ba3c2792ba47d989fb498b096738c15df4fcae68e49fa72acb5b7521aa624754c2b08962d445d3a08ecba7c1ee121cd232bf25e91ed34aceb74f63c8d353a14f7d25c658a7b3d3df4704b64e790e9468fb114ddd2971", 0xab, 0x1ff}, {&(0x7f0000000540)="72efaa6eeaf3a055a8bceaf84f2c865ee28b6f185e6ecd96b934bd0d539e1781b5b751438cdb0a74851e90458f22237664729716080c134870409c5427df7687c8f3fc6470940e1ff33faed4105bfb35dd9bd8182ca17dec12396e51bdc9cc1705df315710aa0a46f0b2397941f3d8b662eddf96311543fcdb6dd86b45cf78f121cefbb0dac46db126e53bff32ba1f1278e01cf41c5780980c5f583fd6ec93c6039339778439f4c47e4bea63e60e175427566e4de5aeb399d39d5d27a31f53bcc0f8f541fd38df6a3170cd", 0xcb, 0xfffffffffffffff8}], 0x8240ca, &(0x7f0000000700)={[{@dmode={'dmode', 0x3d, 0x10001}}, {@gid}, {@cruft}, {@nocompress}, {@uid}, {@nojoliet}], [{@subj_user={'subj_user', 0x3d, '-z'}}, {@smackfsroot}, {@subj_user}, {@rootcontext={'rootcontext', 0x3d, 'staff_u'}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\xb3{$'}}, {@fsname={'fsname', 0x3d, ']'}}, {@euid_gt}, {@subj_role={'subj_role', 0x3d, '(/@*}!{$'}}]}) sendmsg$nl_generic(r1, &(0x7f0000000a40)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)={0x190, 0x38, 0x200, 0x70bd2b, 0x25dfdbfc, {0x14}, [@nested={0x17c, 0x42, 0x0, 0x1, [@typed={0xc4, 0x14, 0x0, 0x0, @binary="b39083f97b4125cf39219c39aba05f3f4188665b1a1328d6d853caa193655886ca0e66beaca39f1b6fa83318a435c38e0bd1ff36cca47e74b482b95639a57af5f0710bb62aa2b4cc9487d2294ccbe1e7c25e2614c8b426a0bddfa79eb0505c37869aa90d93762213926c29775b0efb4e9d45f3ba5fffdc64423b98820279b76e08ba31f0aa01a80b931857f24cdb720362a3df6a19d7f5a11d1fa8f41185cc25a1a63c3f09ee5d8c8434c8e68d675e6bd5cfcd4e48cd1a8f807ae077beb27120"}, @typed={0x8, 0x20, 0x0, 0x0, @fd=r2}, @typed={0x8, 0x7e, 0x0, 0x0, @pid=0xffffffffffffffff}, @generic="f1d7839d991a3878478a7647400bf7b8e08bf44620efef9ac371b1379e000015ec2a0285563bd9cac9238d4d2ecea80cae3f461ce345c30019fb25d3f30e38892f080a8dd1c1ce7dc1dbc06dc9d2ad839b46f16746b503e619f5c2871b7fbfc08c3b7b8aac281532334127a22a41c7dea4c44f307991f5aef87c4f6d9cae52b35fed690c47e110d5d190087b32d8af0d5fb1d5bb05ebd01e4d69cd6460273ba5b708a9a6"]}]}, 0x190}, 0x1, 0x0, 0x0, 0x40014}, 0x40880) 03:21:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) pipe(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) perf_event_open$cgroup(&(0x7f0000000080)={0x4, 0x80, 0x20, 0x1, 0x80, 0x2, 0x0, 0x1, 0x8800, 0x2, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_config_ext={0x40, 0x8}, 0x4100, 0x3, 0x7fff, 0x5, 0x5, 0x3c, 0x401, 0x0, 0x401, 0x0, 0x691}, r3, 0x10, r4, 0x1) write$binfmt_elf64(r0, &(0x7f0000000300)={{0x7f, 0x45, 0x4c, 0x46, 0x5, 0x8, 0x81, 0x0, 0x9, 0x3, 0x3e, 0x0, 0x14c, 0x40, 0x22c, 0x7e, 0x1, 0x38, 0x1, 0x100, 0x5, 0x9}, [{0x60000000, 0x10000, 0x1, 0x100000001, 0x1b, 0x80, 0x81, 0xe000000000000000}, {0x60000000, 0x4d77d41d, 0x1609c0, 0x0, 0x8, 0x7fffffff, 0x7, 0x9}], "8280a86cdfd04b2130cb18d4d3854975c46a243d177861e347fdc1d1f25bc92796f8be0ff3bacd54a386ef66c37ea2aeb139c3fdb0ebd036a5bf47c720b9400673bb7d6cae849c6c6131b060718f5e5419019b0adb5f22fcf31a90c44f860befc21cc0688dd83fbce81290239a9ce9489a0182b502258970f8860066b659e2c9468d8c26078c7ba78f37f74ca06def913d63903b3a88754b195367e140a6678d9a0907", ['\x00', '\x00', '\x00']}, 0x453) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x9286, 0x0, 0x0, 0x7}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:18 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:18 executing program 5: r0 = fork() ptrace(0x10, r0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x1) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$PIO_FONTX(r1, 0x4b6c, &(0x7f0000000280)={0x73, 0x10, &(0x7f0000000680)="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"}) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)=0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000240)=0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x8, 0x9, 0x3, 0x6, 0x0, 0x0, 0xa0050, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x80000000, 0x4, @perf_config_ext={0x0, 0x9656}, 0x10, 0x10001, 0x72, 0x7, 0xffffffffffff8001, 0xfe, 0x354, 0x0, 0x0, 0x0, 0xffffffffffffffff}, r4, 0xd, 0xffffffffffffffff, 0x1) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x65) r6 = dup2(r5, 0xffffffffffffffff) ioctl$int_in(r6, 0x5452, &(0x7f0000000180)=0x639) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x2, 0xf3, 0xb9, 0xff, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80, 0x2, @perf_bp={&(0x7f0000000040), 0x2}, 0x108, 0x566, 0xffffffdb, 0x8, 0x8000, 0x88, 0x200, 0x0, 0x2, 0x0, 0x5}, r3, 0x0, r5, 0x2) fcntl$setown(0xffffffffffffffff, 0x8, r2) waitid(0x2, 0x0, &(0x7f0000000300), 0x8, &(0x7f00000003c0)) ioctl$TCGETS2(r1, 0x802c542a, &(0x7f00000002c0)) 03:21:19 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fallocate(r0, 0xa, 0x4, 0x89) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:19 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:19 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x9286, 0x0, 0x0, 0x7}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:32 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:32 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:32 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x9286, 0x0, 0x0, 0x7}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:32 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:32 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:32 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) r1 = getpid() r2 = getpgid(0x0) r3 = getpgid(0x0) epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) r5 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000180)='/sys/module/pci_hotplug', 0x10a00, 0x2) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r4, &(0x7f00000000c0)) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x5, 0xd7, 0x1, 0x7, 0x0, 0x5, 0x10118, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x4, @perf_config_ext={0x7, 0xda5}, 0x0, 0xffff, 0x3, 0x8, 0x976f, 0x97, 0xee4, 0x0, 0xaca6, 0x0, 0x1ff}, r3, 0xf, 0xffffffffffffffff, 0x0) r6 = epoll_create(0x1) r7 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f00000000c0)) ioprio_get$pid(0x2, r1) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r6, &(0x7f0000000040)={r6, r7}) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r8, 0x540a, 0x2) ioctl$TCSETSF(r8, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) kcmp(r2, r0, 0x2, r8, 0xffffffffffffffff) 03:21:32 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) openat$sr(0xffffffffffffff9c, &(0x7f00000000c0), 0xc2, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) creat(&(0x7f0000000080)='./file1\x00', 0x0) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:32 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 880.771508] perf: interrupt took too long (2508 > 2500), lowering kernel.perf_event_max_sample_rate to 79000 03:21:33 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:33 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x9286, 0x0, 0x0, 0x7}) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:33 executing program 5: fork() recvmsg$unix(0xffffffffffffffff, &(0x7f0000000380)={&(0x7f0000000000), 0x6e, &(0x7f0000000340)=[{&(0x7f0000000080)=""/133, 0x85}, {&(0x7f0000000140)=""/247, 0xf7}, {&(0x7f0000000240)=""/195, 0xc3}, {&(0x7f0000000480)=""/140, 0x8c}], 0x4, &(0x7f0000000680)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x108}, 0x40000002) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:21:33 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x100}, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(0xffffffffffffffff, 0x2405, r0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) setsockopt$inet6_int(r1, 0x29, 0x12, &(0x7f0000000080), 0x4) setsockopt$inet6_IPV6_DSTOPTS(r2, 0x29, 0x3b, &(0x7f0000000300)={0x2f, 0x13, '\x00', [@hao={0xc9, 0x10, @remote}, @ra={0x5, 0x2, 0x8}, @hao={0xc9, 0x10, @mcast2}, @pad1, @ra={0x5, 0x2, 0x2}, @pad1, @padn={0x1, 0x6, [0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}, @jumbo={0xc2, 0x4, 0x1e6d}, @calipso={0x7, 0x58, {0x2, 0x14, 0x81, 0x4, [0x4, 0x336, 0xfd0e, 0xffffffffffffff48, 0x1, 0x9000000, 0x0, 0x7f, 0xddb, 0x8000]}}]}, 0xa8) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:33 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:33 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:46 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:46 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 6: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r0, 0xffffffffffffffff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x4e22, 0x0, @private0={0xfc, 0x0, '\x00', 0x1}, 0x5}, 0x1c) 03:21:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r3, 0xffffffffffffffff) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000080)) r4 = openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fallocate(r4, 0x4, 0x3847, 0x7fffffff) 03:21:46 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) fcntl$getown(r1, 0x9) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) ioctl$TCSETSW(r1, 0x5403, &(0x7f0000000040)={0x200, 0x7fff, 0x7, 0x3, 0xb, "79ef855a6093166b15360258ad4579c09c2400"}) 03:21:46 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:46 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) syz_io_uring_setup(0x5a6e, &(0x7f00000001c0), &(0x7f0000ffa000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f00000000c0)=0x0) r3 = socket$packet(0x11, 0x3, 0x300) r4 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000140)={'lo\x00', 0x0}) bind$packet(r3, &(0x7f0000000580)={0x11, 0x0, r5, 0x1, 0x0, 0x6, @local}, 0x14) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd=r3, 0x0, 0x0}, 0x0) syz_io_uring_submit(0x0, r2, &(0x7f0000000080)=@IORING_OP_FALLOCATE={0x11, 0x1, 0x0, @fd_index=0x9, 0x2, 0x0, 0xfff, 0x0, 0x1}, 0x7ff) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r6 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x100000001) openat2(r6, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r8, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:46 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:46 executing program 5: r0 = fork() ptrace(0x4208, r0) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$setsig(0x4203, r1, 0x2, &(0x7f0000000000)={0x2c, 0x8, 0x7fff}) 03:21:46 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) ptrace(0x11, r2) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r5 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x100000001) r7 = openat2(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0x5e9e81, 0x93, 0x13}, 0x18) r8 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r0, &(0x7f0000000080)={0x2}) pread64(r8, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:21:47 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:47 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:21:47 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:21:47 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:00 executing program 7: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:00 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:00 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:00 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) sendfile(r0, r0, &(0x7f0000000240)=0x1, 0xfffffffffffffffc) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) r2 = perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000180)={{0x1, 0x1, 0x18, r3, {0x2}}, './file1\x00'}) openat(r5, &(0x7f0000000200)='./file1\x00', 0x2001, 0x100) sendfile(r3, r4, 0x0, 0x100000001) openat2(r3, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000080)=""/96, 0x60, 0x10000) 03:22:00 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:00 executing program 5: r0 = fork() ptrace(0x10, r0) getpgid(r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x20000000, &(0x7f00000003c0)) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) ptrace(0x4207, r1) 03:22:00 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:00 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:00 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:14 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:14 executing program 5: r0 = fork() ptrace(0x10, r0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000000c0)={0x0, 0x0}) perf_event_open(&(0x7f0000000040)={0x3, 0x80, 0x40, 0x5, 0x3, 0x1, 0x0, 0x9, 0x122, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x2, @perf_bp={&(0x7f0000000000), 0x2}, 0x800, 0x75, 0x6, 0x0, 0x6, 0x5308, 0x5, 0x0, 0xfffeffff, 0x0, 0x1ff}, r1, 0x3, 0xffffffffffffffff, 0x0) waitid(0x0, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:22:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:14 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() prlimit64(r1, 0xe, &(0x7f00000000c0)={0x2, 0x2}, &(0x7f0000000180)) sendfile(r0, 0xffffffffffffffff, 0x0, 0x80000000) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) creat(&(0x7f0000000080)='./file1\x00', 0x0) 03:22:14 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:14 executing program 2: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:14 executing program 6: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:14 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:14 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:14 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r2, 0xffffffffffffffff) openat(r2, &(0x7f0000000080)='./file1\x00', 0x600, 0x88) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r3, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:14 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:14 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, r0, &(0x7f0000000600), 0x80000000, &(0x7f00000003c0)) 03:22:14 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:14 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:14 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:14 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:31 executing program 5: r0 = fork() ptrace(0x10, r0) getpid() waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) getpgrp(r0) 03:22:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:31 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:31 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:31 executing program 3: r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) tee(r0, r1, 0x4, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(r2, 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfe, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat2(r4, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:31 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:31 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:31 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:31 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:31 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:31 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:31 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) ptrace(0x11, 0xffffffffffffffff) 03:22:46 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:46 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:46 executing program 5: ptrace(0x10, 0x0) wait4(0x0, &(0x7f00000000c0), 0x80000001, &(0x7f0000000100)) waitid(0x6, 0xffffffffffffffff, &(0x7f00000001c0), 0x4, &(0x7f0000000240)) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x0}, &(0x7f0000000080)="1b21c6f2ff66a3d0f39f72fe582035a3ceed8127bedcb5c8bb64ae7c81c097d095f83b6ca5039c5568f40972fb0343b1d709c1856405fa53269e3191bd09346c", 0x40, 0x0) 03:22:46 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:46 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:46 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) pipe2(&(0x7f0000000080), 0x800) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) pidfd_open(r1, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) [ 954.152667] perf: interrupt took too long (3208 > 3135), lowering kernel.perf_event_max_sample_rate to 62000 03:22:46 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:46 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:22:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:46 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:46 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) waitid(0x0, r0, 0x0, 0x80000000, &(0x7f00000000c0)) tkill(r0, 0xc) r1 = syz_io_uring_complete(0x0) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r2, 0x540a, 0x2) ioctl$TCSETSF(r2, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) kcmp$KCMP_EPOLL_TFD(0x0, r0, 0x7, r1, &(0x7f0000000080)={0xffffffffffffffff, r2, 0x3}) ptrace$setsig(0x4203, r0, 0xff, &(0x7f0000000000)={0xc, 0xff, 0x8000}) 03:22:46 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:46 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:22:46 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:22:46 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) [ 954.424564] perf: interrupt took too long (4032 > 4010), lowering kernel.perf_event_max_sample_rate to 49000 03:22:46 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file0\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xa, 0xffffffffffffffff, 0x0) getpid() r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x107ffffff) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x30d40, 0x0) sendfile(r4, r5, 0x0, 0x100000001) stat(&(0x7f00000000c0)='./file1\x00', &(0x7f0000000300)) openat(r4, &(0x7f0000000080)='./file0\x00', 0x88000, 0xa2) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:03 executing program 5: r0 = fork() ptrace(0x10, r0) tgkill(r0, r0, 0x27) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)={0x0, 0x0}) r2 = gettid() getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000000240)={0x0}, &(0x7f0000000280)=0xc) syz_open_procfs(r3, &(0x7f00000002c0)='net/connector\x00') ptrace$setopts(0x4206, r2, 0x4, 0x22) waitid(0x0, r0, &(0x7f0000000100), 0x1, &(0x7f0000000180)) wait4(r1, 0x0, 0x8, &(0x7f0000000040)) r4 = getpid() r5 = getpgid(0x0) r6 = epoll_create(0x1) r7 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r6, 0x1, r7, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r4, r5, 0x7, r6, &(0x7f0000000040)={r6, r7}) waitid(0x3, r5, 0x0, 0x0, &(0x7f0000000300)) 03:23:03 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:03 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:03 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:03 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:03 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:03 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = getpid() sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffffff, &(0x7f0000000200)='./file0\x00', 0x80082, 0x28) sendmsg$nl_generic(r0, &(0x7f0000000180)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000000c0)={&(0x7f0000000300)=ANY=[@ANYBLOB="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", @ANYRES32=r3, @ANYBLOB="8a0f320408409d64540dc6014caa5146c4565a3729e8c87c2136c157c50002"], 0x170}, 0x1, 0x0, 0x0, 0x4000000}, 0x40080) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat(r2, &(0x7f0000000480)='./file0\x00', 0x400000, 0x5) openat2(r4, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:03 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:03 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:03 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:03 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:18 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 5: r0 = fork() ptrace(0x10, r0) clone3(&(0x7f0000000240)={0x118000000, &(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080), {0x25}, &(0x7f00000000c0)=""/181, 0xb5, &(0x7f0000000180)=""/116, &(0x7f0000000200)=[r0, r0, r0, r0, r0, r0, r0, r0, r0, r0], 0xa}, 0x58) sched_setparam(r1, &(0x7f00000002c0)=0x97d) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:23:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:18 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x6, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) fallocate(r1, 0x34, 0x4, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x22a002, 0x86) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) openat$tun(0xffffffffffffff9c, &(0x7f00000000c0), 0x28880, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:18 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:18 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:18 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:18 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:18 executing program 5: r0 = fork() r1 = getpid() r2 = getpid() r3 = getpgid(0x0) r4 = epoll_create(0x1) r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r4, 0x1, r5, &(0x7f00000000c0)={0x80002000}) kcmp$KCMP_EPOLL_TFD(r2, r3, 0x7, r4, &(0x7f0000000040)={r4, r5}) r6 = getpgid(r2) r7 = epoll_create(0x1) r8 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r8, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r6, 0x7, r7, &(0x7f0000000040)={r7, r8}) getpgrp(r1) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:23:18 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:18 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:34 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:34 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:34 executing program 5: r0 = fork() r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) ptrace$setsig(0x4203, r2, 0x9, &(0x7f0000000000)={0x10, 0x1, 0x400}) ptrace(0x10, r0) r5 = getpid() r6 = getpgid(0x0) r7 = epoll_create(0x1) r8 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r8, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r5, r6, 0x7, r7, &(0x7f0000000040)={r7, r8}) waitid(0x1, r5, &(0x7f0000000500), 0x8, 0x0) r9 = dup3(r3, r3, 0x0) writev(r9, &(0x7f0000000480)=[{&(0x7f0000000100)="108501e8814505af48b012e4df4fea2014e653b3b64f463f6786c787d9dc67b1ca7c13d62bff2ac187b60231d4fc07eb2c04f37a0fd3c07419fb5444bf936e06323d297cb025db3b35fc03219ff29014", 0x50}, {&(0x7f0000000180)="b4e51985edff95db34340bddcbad226feccdacb9ea2022e1c8830c9bbcbcb745781f7aaa5ecccc99eb6d09f8efb79f2d72116c0d41a2e835487c8865751d67ddb56a07", 0x43}, {&(0x7f0000000200)="24b8da25e19884bfdd3979b44f1ffac2bd1e95577d29017713ded592729ed3b36b4e5d5098d4bd053172a6458394ad68987f8a35d45dfb7357c38194e47a6ade278f63b6e3af14ba1002aa6b691fa30f6c7650a576984ee37c5ecd18d4c098bff2119fa66dee53ef10cdc726ad9a8466bb4544d6bed939c894ab2004ff618310e617670f102d833ece707d7b469ee5afa0630a2f0fb104ceda6940c816ed8c657b63d0f6c1db3efedc5af3458393d357257c0e04737f01714c582e8e0e9079cd25fe3d5ae67f53f6c048c4fc7e759f8d7d61206773fac89e0f", 0xd9}, {&(0x7f0000000300)="91e1105dbbad1968018043355e3ae4818bec24b83c8773c4ae252036b42dceb4aeace3d647ca71cefe8942c8fdd03a5d70a14bbf5fcced88c8e0ae8074c9615d7e23eab5c74da610a4df814570a65867dd7d7054d6633fb3ca3e0868468ba9b412c7d24a199275367ef6554529c61a6869062953ef139d696f543b400c220bd0a38eca1428f8bec933f19f577670493c3c0b3f8cf64a8b2c63638dd7343b2a74fd29a840131f0e50958edfd608221b9dc571", 0xb2}, {&(0x7f0000000080)="c730345c0a66bf7263909a76dafbbfb3f2bc6c6a3e2e9c", 0x17}], 0x5) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:23:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:34 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:34 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0xc6, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x61}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {r0}}, './file1\x00'}) ioctl$BTRFS_IOC_QUOTA_RESCAN_WAIT(r3, 0x942e, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:34 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:34 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:34 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:34 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:34 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) write(r0, &(0x7f0000000300)="9acdbb1458a60196dab59ddc3ebfc36ef130dc6882f6a5cf04c3a47360615c25d416943e75bb277903238b9e07296dadaa5e16b9fe60784fa6357629fd9d21d437c083a6110f04bf19b9b49d8af87f57fce97581a59e5996212c44c015d7658c04718f4991fd979cbeb0d91c724d261f95716c89aa6c28d9d54137533f9bd0e76a5d72160a64a566873f9b81f00f4ee9709c97bec977a27a8c2fd89bb8925cd7b91679bb511ffcb35cd0eac0120c67f0f562f396341302ee3d07f67e9c", 0xbd) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat2$dir(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000180)={0x701000, 0x26, 0x10}, 0x18) fsetxattr$trusted_overlay_opaque(r3, &(0x7f0000000200), &(0x7f00000003c0), 0x2, 0x1) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0xffffffffffffff0c, 0x200000048) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r5, 0xffffffffffffffff) ioctl$HIDIOCSUSAGE(r5, 0x4018480c, &(0x7f0000000080)={0x3, 0x100, 0xfb, 0x5, 0xffffffcd}) 03:23:34 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) openat2(r0, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:34 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:34 executing program 5: r0 = fork() r1 = getpid() ptrace(0x11, r1) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:23:34 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:51 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) sendfile(0xffffffffffffffff, r3, &(0x7f0000000080)=0x40, 0x4) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') r5 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r5, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f0000000040)={0xffffffffffffffff, r5}) sendmsg$nl_generic(r4, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000300)={0x13dc, 0x1f, 0x100, 0x70bd26, 0x25dfdbfe, {0x3}, [@nested={0x10af, 0x6e, 0x0, 0x1, [@generic="ef4bde2f818b9499c300abf6303f5d4d5058019e52a699dec19a1c7b81a5dcfdebaea57aec9794ae711d6d4f18f170eef87e48df65b964ac7321fd06575486709fd698a19dda653056574be59f1704a5b5a7c5c984c1e495c06b04a28e65143b17562163474f0a", @typed={0x8, 0x44, 0x0, 0x0, @pid}, @typed={0x14, 0x65, 0x0, 0x0, @ipv6=@local}, @typed={0xc, 0x22, 0x0, 0x0, @u64=0xa05c}, @generic="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", @typed={0x1b, 0x1d, 0x0, 0x0, @str='net/ip6_tables_matches\x00'}]}, @generic="0eff93f7f22251df902b395ef57b13914e5a0b48bf376cd188a9e26f84318ae78511eba629d44ec269a8ed31d710a6b3789dfd3bf40b732623a48b4d6e89daf167c9a1de487dbaf7ca559f9bc6bb7b40798435e5eef73dc188ffaca2dc0c5b60a844a0dbea500d20ac3600490064cd780a8cd51e2c9aed35b8d7d83771b5e105c8c9c9c2f8cd7f03a504704c87d2cad419691fa3c854861b39728594a6e893c5e718b2b6e9bb582fb76bacc11434f50cd2471960", @generic="f1b6d0705899b23b5b8ab74305d9c15e0dc35d6a49c22ac83cef326a9e48774349303629a6e8c62976063a766a2780ec36da63574ddfaa6145d7d531d756056a33eeda7dd66c67ff5a5f08c9e76c30bcff5bf2c11004fabf6d36278dd676894f4eb08c5ee2fa3745bff8fb0318afb9ffe7ace6b9e5111154c86f3e8f0a48a2e83b24010b15d010aec8e320b424ca69cee0377454d301c90b2d881f44420a4040159dd8e349c059ab41f26cb89e5d988400b95ad173721fcf510838602f57e8bb29859de622ec0f4bc854405b3ab3a7b9cd5f30da602296924e7315355c7119355f71cffde18cb6eb17f2c78aebedcba1dd5876a67d0231dd7e10", @generic="a27c937e8457225f9e26ea867e796cafe2a95b414a248faab8a9d498c064aafa0714534a47444b8fab94c7e4d776a29ab3f1ead6f0a8f6321902e69dd4079ce2a05d454fb135445e1b8cf9c836b25da8a844763b3e399f34e20e3e3b6976920e1880a46c67b9d33833c05f76d0dd81b1637f4fccfe31b4d6913d8163d48c4d616bce90f7b699f3f71ecff620f42ff3c4c9f7ad07ae13641ae5d9d5a9c683e782", @generic="d9f6847789ac447d192d1c1737655c20d040d636d8c5d3eaf99cfdb478d6c9690ca99cc955a5fd065562f3df8903a6ab25d172cfbd3393c2c466527b4f4527cddc72ea7d48e9fc87f91814f47ed92b1000b4116ac39c08f7659b27ad78e22b8d2add051983895d9285c3b04b2ff0af9c3fb584a023c36b9ff41354989849cfdf1319235c015f99ae9d628a27a3c78717f84eb791d2627668e14df7196bee3a0d2449763c9d1badc7ceb587bd869ef88cfdba5df758931198cc1050139026a3352c0cae9238e71e69"]}, 0x13dc}, 0x1, 0x0, 0x0, 0x80}, 0x8088) pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r0, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:51 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) waitid(0x2, r0, &(0x7f0000000000), 0x1, &(0x7f0000000080)) 03:23:51 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:23:51 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:51 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:51 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:51 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:51 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:23:51 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:23:51 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 5: r0 = fork() ptrace(0x10, r0) fork() waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) fork() 03:24:07 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000180), 0x4800, &(0x7f0000000200)={[{@name}], [{@uid_lt={'uid<', r4}}, {@smackfshat={'smackfshat', 0x3d, 'nfs'}}, {@dont_appraise}]}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000a00)='nfs') lseek(r3, 0x8, 0x0) sysfs$1(0x1, 0x0) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:07 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 4: r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) openat(r0, &(0x7f00000000c0)='./file1\x00', 0x10000, 0x24) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000080)='/proc/thread-self/attr/sockcreate\x00', 0x2, 0x0) fstat(r4, &(0x7f0000000300)) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:07 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:07 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 5: r0 = fork() ptrace(0x10, r0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000140)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x3}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) r5 = syz_open_procfs(r2, &(0x7f0000000000)='net/udp6\x00') readv(r5, &(0x7f0000000280)=[{&(0x7f00000004c0)=""/4089, 0xff9}], 0x1) waitid(0x0, 0x0, &(0x7f0000000600), 0x2, &(0x7f00000003c0)) 03:24:07 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:07 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:07 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:07 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:23 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) r2 = fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r1, 0xffffffffffffffff, 0x0, 0x100000001) ioctl$EXT4_IOC_MOVE_EXT(r2, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x80000000, 0x99c, 0x8, 0xffff}) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat2(r3, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:23 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:23 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x0, 0x0, &(0x7f0000000600), 0x8, &(0x7f0000000000)) 03:24:23 executing program 4: openat(0xffffffffffffff9c, 0x0, 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:23 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:23 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r4, 0x0) mount$cgroup(0x0, &(0x7f0000000080)='./file1\x00', &(0x7f0000000180), 0x4800, &(0x7f0000000200)={[{@name}], [{@uid_lt={'uid<', r4}}, {@smackfshat={'smackfshat', 0x3d, 'nfs'}}, {@dont_appraise}]}) perf_event_open(&(0x7f00000000c0)={0x2, 0x80, 0x6f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sysfs$1(0x1, &(0x7f0000000a00)='nfs') lseek(r3, 0x8, 0x0) sysfs$1(0x1, 0x0) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:23 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, 0x0) pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:23 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:23 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:23 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:36 executing program 5: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/l2cap\x00') io_uring_register$IORING_REGISTER_EVENTFD_ASYNC(0xffffffffffffffff, 0x7, &(0x7f0000000040)=r0, 0x1) r1 = fork() fsetxattr$trusted_overlay_origin(0xffffffffffffffff, &(0x7f0000000300), &(0x7f0000000340), 0x2, 0x1) syz_io_uring_setup(0x5b10, &(0x7f0000000180)={0x0, 0xc7b5, 0x2, 0x2, 0xf7, 0x0, r0}, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000000200), &(0x7f0000000240)) ptrace(0x10, r1) ptrace(0x4208, r1) fork() waitid(0x0, r1, &(0x7f0000000280), 0x8, &(0x7f00000003c0)) ptrace$getregset(0x4204, r1, 0x1, &(0x7f0000000140)={&(0x7f0000000080)=""/131, 0x83}) 03:24:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:36 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:36 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:36 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x10000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat(r4, &(0x7f0000000080)='./file1\x00', 0x10d400, 0xb5c077a8204a7685) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:36 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:36 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:36 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:36 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:36 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:36 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:36 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:36 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, 0x0, 0x0, 0x200000048) 03:24:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') r4 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f00000000c0)='./file1\x00', 0x0, 0x6, &(0x7f0000000640)=[{&(0x7f0000000180)="57f63146c317c1944da2c192d24897", 0xf, 0xee4}, {&(0x7f0000000300)="195cbfa3977b38d008129541331531f05975b0a5afadb7b474b347980eb5fcbe23312ac5b78dcffe7376ed68e99a931503ae1da59bdb5afbeecb897c6bd6e65b82f206bd0fd2edc3bcbebfd321deba6eddcc2468b41252820b50e909105bf532f2700b722d72fc24a75aa80138b112773a75fef05beaa944eb4c7fc7af181b069874ff5195805c159caec336997485370d0cec54b5b0f0ffc297d38ab08a2a01194439757423a8ea4b82878492cb2896e50257cbda4ebe4e6b413c04712c26363002a77fa8b9571eaf5c6cecd8e26ded95c4b3", 0xd3, 0x2e34}, {&(0x7f0000000400)="18ed22d4cf01d85942072ba91f1cc67da51aa6e8cf0e33266c9883a9f64d3bfaaa85e79b22b40fb552a9f35dc9e1a3500e792a200aaae8f02aaa158b9a28e716d543ce7926b681329e6542fee94bad45d64efdc008bf25de18ac89cd8c9a98", 0x5f, 0x8}, {&(0x7f0000000200)="0089fcd18c10e1a7df74d4abbe7f6e40f0b2b5586440e546b511081aa5e45a6e7cf0883d8cdc01aa90a608f8f8", 0x2d, 0x3}, {&(0x7f0000000480)="d233eda885a42a5eaa92847ff556a2a894349cdd905e0c95d1f832f6565f26e64bd36e657e0a2d4ca5707fd873a60ae2f3700f12d125164bdd3bf232acedc94e8403f1d4671a0e5ef73ad5dcfbb35d7a32c4c58201091b6bcc88972378cc9bac16f63210f354d62888d052a29c5f060c426d76722756b8c262437b43f288dbdc3d965dc276a669c4a8d9fef9d63b60b9081778fac8e1812f7e7588e6a12e0deac3e231713e61dd0ba50d6cf5ee969c26bf529b4be63e254b8d3aa7b1b111578ebff487bd15ef96efc6f29a510134350fded091a45b2ca93286439616c533db", 0xdf, 0x5}, {&(0x7f0000000580)="48ee087d2206bc2982be6bf981195ce70161905689091b34a5fdf1d475105f8c652b2923db80c583f12356c09cd64319ba2d0cc7381f5a505290741db007b477b98f88d8b542c84423e3a50aa6904439790a19cad933ebc6281632dc791f6dc75809bce8ae20a4a81271a82d042986799148d3f62b31c7a5f848c6b28b749a1c0fb4dfccda2ca3d4e1375bd92ccb85788be334742508538c5fc8a315f827fd5157d1069bb8f0679b72265ec41af08e9f3c4fc600a5d947958accfb451be926ee", 0xc0, 0x8333}], 0x26ffe8bd70cbef0f, &(0x7f0000000700)={[{@dots}, {@nodots}, {@dots}], [{@obj_user={'obj_user', 0x3d, 'net/ip6_tables_matches\x00'}}, {@subj_user={'subj_user', 0x3d, ':{'}}, {@fsuuid={'fsuuid', 0x3d, {[0x32, 0x64, 0x0, 0x36, 0x0, 0x39, 0x64, 0x31], 0x2d, [0x63, 0x38, 0x0, 0x39], 0x2d, [0xd, 0x32, 0x30, 0x61], 0x2d, [0x32, 0x39, 0x65, 0x63], 0x2d, [0x36, 0x37, 0x62, 0x65, 0x36, 0x35, 0x39, 0x30]}}}, {@pcr={'pcr', 0x3d, 0x21}}, {@smackfsfloor={'smackfsfloor', 0x3d, '\'[i/'}}, {@appraise}, {@subj_type={'subj_type', 0x3d, '\xc2$'}}]}) openat(r4, &(0x7f00000007c0)='./file1\x00', 0xa980, 0x142) pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:24:36 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:50 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x1, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) pwrite64(r3, &(0x7f0000000300)="8d8b9c9f2e08e6d0551895a186f3a47fb216d68fd80ad927d6d132cee6af1f353006568f99d4d902a0b0eadd1eb71261df7f7b0717a1930c92ebe55109a7557cb80a8368bf1c944759dc82983512ec25a2558684e43594ee0f4b8387b661db0565ae89f0bb6c84b2c3dd543b0c50c4772af631fdd5cf773d0881a4a3ae42a4aee475787d538bc971f5896843e6962ba1e974fb06e5e60478dea5416c19a488dee3041377d072d9fac2aa2e6b43938c363ab962548b75afad6037b15b84e44fbdde", 0xc1, 0x6) 03:24:50 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:50 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:50 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:50 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, 0x0, 0x0, 0x200000048) 03:24:50 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:24:50 executing program 5: ptrace(0x10, 0x0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:24:50 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:24:50 executing program 5: r0 = fork() r1 = fcntl$getown(0xffffffffffffffff, 0x9) ptrace$cont(0x1f, r1, 0x5, 0x20) ptrace$setopts(0x4200, r1, 0x9, 0x4) ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) 03:24:50 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, 0x0, 0x0, 0x200000048) 03:25:05 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:05 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:05 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) ptrace$poke(0x5, r1, &(0x7f0000000000), 0x2) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) ptrace(0x8, r2) waitid(0x0, 0x0, &(0x7f0000000600), 0x1000000, &(0x7f00000001c0)) 03:25:05 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x0) 03:25:05 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x0, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:05 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:05 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) r1 = fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) ioctl$BTRFS_IOC_SCRUB(r1, 0xc400941b, &(0x7f0000000300)={0x0, 0x2, 0xffff}) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:25:06 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x0) 03:25:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:06 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:06 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:06 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:06 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:25:06 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x8, 0x9c, 0x8, 0x5, 0x0, 0x7, 0x20103, 0x8, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x400, 0x4, @perf_config_ext={0x400, 0x2}, 0x252, 0x40, 0x6, 0x7, 0x1, 0xffffff80, 0x800, 0x0, 0x8000, 0x0, 0x3}, r0, 0xc, 0xffffffffffffffff, 0x2) 03:25:06 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:06 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, 0x0, 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:20 executing program 1: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:20 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:20 executing program 5: ptrace(0x10, 0x0) waitid(0x1, 0x0, &(0x7f0000000600), 0x4, &(0x7f00000003c0)) 03:25:20 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x101800, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:25:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:20 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:20 executing program 0: r0 = socket$inet_icmp(0x2, 0x2, 0x1) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r1, 0x540a, 0x2) ioctl$TCSETSF(r1, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) tee(r0, r1, 0x4, 0x2) r2 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(r2, 0x0, 0x1) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r3 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r3, 0x540a, 0x2) ioctl$TCSETSF(r3, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0xfe, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) sendfile(r0, 0xffffffffffffffff, 0x0, 0x2) r4 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x100000001) openat2(r4, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r6 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r6, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:25:20 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r2 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r2, r3, 0x0, 0x100000001) openat2(r2, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r4 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') getpgid(r1) r5 = socket$inet6_udplite(0xa, 0x2, 0x88) ioctl$BTRFS_IOC_BALANCE(r5, 0x5000940c, 0x0) accept4$unix(r2, &(0x7f0000000080)=@abs, &(0x7f0000000180)=0x6e, 0x80000) pread64(r4, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:25:20 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:20 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:20 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:20 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:20 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = fork() waitid(0x0, r0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) ioctl$TCSETSF(0xffffffffffffffff, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000e80)='./binderfs/binder-control\x00', 0x2, 0x0) stat(&(0x7f0000000ec0)='./file0\x00', &(0x7f0000000f00)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = gettid() newfstatat(0xffffffffffffff9c, &(0x7f0000000f80)='./file0\x00', &(0x7f0000000fc0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0xffffffffffffffff, r6, 0x0) stat(&(0x7f0000001cc0)='.\x00', &(0x7f0000001c00)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setxattr$system_posix_acl(&(0x7f0000000100)='./file0\x00', &(0x7f0000000140)='system.posix_acl_default\x00', &(0x7f0000002040)={{}, {}, [{0x2, 0x0, 0xee01}], {0x4, 0x2}, [{0x8, 0x1, 0xee01}, {0x8, 0x7, r7}, {0x8, 0x2, 0xffffffffffffffff}, {0x8, 0x4}], {}, {0x20, 0x1}}, 0x4c, 0x2) r8 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r8, 0x540a, 0x2) ioctl$TCSETSF(r8, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) r9 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r9, 0x540a, 0x2) ioctl$TCSETSF(r9, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000001140)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x200000}, 0xc, &(0x7f0000000300)=[{&(0x7f0000000040)={0x18, 0x1b, 0x100, 0x70bd27, 0x25dfdbfc, "", [@typed={0x8, 0x73, 0x0, 0x0, @uid=0xee00}]}, 0x18}, {&(0x7f0000000080)={0x208, 0x29, 0x508, 0x70bd26, 0x25dfdbfc, "", [@nested={0x120, 0x25, 0x0, 0x1, [@typed={0x8, 0x13, 0x0, 0x0, @u32=0x2}, @typed={0x8, 0x24, 0x0, 0x0, @u32=0x6a}, @typed={0x8, 0x32, 0x0, 0x0, @fd}, @typed={0x8, 0x10, 0x0, 0x0, @uid=0xee00}, @typed={0xe7, 0x91, 0x0, 0x0, @binary="f360bb2e2c99523a9e6ae3aca7aa0709e2041ed51e5cec3584238c1cf676fedcb6dc6f7823cef7ae1479aa8d97ae63ec60e904e23c42a91f3832554047be255428148a5e96cc980dde8eac66cd955d392b4d0ef7980205fa3dfd5ddd4594cb5310ca56b610ef0caabb435e0bb6b7bf5cc9b1016ab5725f3fcc483dbaeb19a76f80f8e75fd41541b6dd5751a36693d65106288e203471ec2986cfeda4ff9ba6f0e79202c5d1603ca7451c574b9ed689bc441450e96b2032bdda55c9a04bda709b05d91177d3ce768dfdc30fdfb86d0cf1520ab4e2fe596d1ba4f5cb4cb77213075a9d1b"}, @typed={0x14, 0x64, 0x0, 0x0, @ipv6=@initdev={0xfe, 0x88, '\x00', 0x1, 0x0}}]}, @generic="0cf36d684a3ff2e9b85e8a3171cf2a75b0a94cdbceafa6f76fda0539542eaee1e29ddc85c838ffcae35deafe4f02c43355c075a1e7a32f9166fbc6480b3fc519103232600520c65170996ac5243ef372597a1e365dab406ad85dd227958cb61f77d1fc36314d3bdbf418afa2ba63c475112d0967d1594cdab6e34c30afad5a117067abd9feb6fdb44241c67e2ea93e97412fec6628924af9131d66db29d8720038384e074fcb0c136a8d2926a5d9bd5ac5aed837e6c61c70bc7dfb8a058494acf726257f785fcab760a46d5c063575d42e48217b1cb3"]}, 0x208}, {&(0x7f00000002c0)={0x10, 0x38, 0x800, 0x70bd2a, 0x25dfdbfc}, 0x10}, {&(0x7f0000000480)={0x170, 0x3e, 0x4, 0x70bd2b, 0x25dfdbfd, "", [@generic="26f2c54e24c2141835a45616be83d346ee1ccab94e9e8b8c55adc94bff16666b32f957efcccbe503716af0b25dfa2d92bfff03ed6ac6b6e3c39e15", @generic="a2466373ec7125a8179eafa185147070fc1524178008da307890d5f5962de86cb671c8f8eb8eae7e714034ed34fb0115e5d3f6674e92b01d10975ef4aca955f937e853f58900ecd256bec9f6d8fc85740621f65fe1b2c414552580f7d13a53028dc96af1b022f579b5a41411d69de5e1a2097b7c7235bbe7ce359617ad9885bf44a807724cbe14cb872e5d34035e6332f90babb8e1554a5892f783241060d99e3ec66e42094975cd4fbf04232c361c329a6907acd48165a3732b606523500489219b1274752fd363cdf40e9d6239e2f765454b06ab325b1614", @nested={0x49, 0x67, 0x0, 0x1, [@generic="cc55f829a8ac59a0c18f6e2ee4645932e7cac833d63508def2e9e7e9932ce16781079e8cefb60b7e0b01cb8bfec1fd1de3f5d28d4e58ed61e21f17f385", @typed={0x8, 0x88, 0x0, 0x0, @fd}]}]}, 0x170}], 0x4, &(0x7f0000001040)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r2]}}, @cred={{0x1c, 0x1, 0x2, {r1, r3, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {r4, 0xffffffffffffffff, r5}}}, @cred={{0x1c, 0x1, 0x2, {r0, r6, r7}}}, @rights={{0x14, 0x1, 0x1, [r8]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, r9, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xe0}, 0x48002) 03:25:20 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:20 executing program 0: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:37 executing program 5: r0 = fork() ptrace(0x10, r0) r1 = getpid() r2 = getpgid(0x0) r3 = getpid() r4 = getpgid(0x0) r5 = epoll_create(0x1) r6 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r5, 0x1, r6, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r3, r4, 0x7, r5, &(0x7f0000000040)={r5, r6}) ptrace$setregset(0x4205, r3, 0x3, &(0x7f0000000280)={&(0x7f0000000100)="bfc138231d1ccadcb03279b5f8f0b5dd03ee972f27dc9f9f272ddec96418cbe544077dfb05714c95d89223554ec1d470f919b3d9a19346db2074ba555da07b553dff56cc0623c09e77ecd232b087adad0550655f0a270bd221a595ea07032ce756feec4a65cacb9be37980052759923341718cd075a735f452b02c9119cb1de2ac2c6528a04e2708ad23c2cde375beed543be9fc7b", 0x95}) r7 = epoll_create(0x1) r8 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r7, 0x1, r8, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r7, &(0x7f0000000040)={r7, r8}) r9 = fcntl$getown(r6, 0x9) wait4(r9, &(0x7f00000002c0), 0x1000000, &(0x7f00000001c0)) getpid() waitid(0x2, 0x0, &(0x7f0000000600), 0x1000000, &(0x7f0000000000)) 03:25:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x100000001) openat2(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:37 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:37 executing program 1: perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x40, 0x7f, 0xe1, 0xe1, 0x0, 0x20, 0x280, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x4, 0x1, @perf_config_ext={0x3f, 0x4}, 0x500, 0x104, 0x3, 0x9, 0x8, 0x0, 0xfff7, 0x0, 0x8}, 0x0, 0x8, 0xffffffffffffffff, 0x2) bind$packet(0xffffffffffffffff, &(0x7f0000000580)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, 0x14) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_WRITEV={0x2, 0x0, 0x0, @fd, 0x0, 0x0}, 0x0) r3 = syz_io_uring_setup(0x1a75, &(0x7f0000000080), &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000ffc000/0x1000)=nil, &(0x7f0000000200)=0x0, &(0x7f0000000100)=0x0) r6 = socket$inet6_udplite(0xa, 0x2, 0x88) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r3, 0x9, 0x0, 0x0) syz_io_uring_submit(r4, r5, &(0x7f0000000000)=@IORING_OP_RECV=@pass_buffer={0x1b, 0x0, 0x0, r6, 0x0, &(0x7f0000000500), 0x0, 0x0, 0x1, {0x0, r7}}, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000180)=@IORING_OP_FSYNC={0x3, 0x4, 0x0, @fd, 0x0, 0x0, 0x0, 0x1}, 0x7) pread64(0xffffffffffffffff, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:25:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:37 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r3, 0xffffffffffffffff) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000080)) r4 = openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fallocate(r4, 0x4, 0x3847, 0x7fffffff) 03:25:37 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x0) (fail_nth: 1) 03:25:37 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(0xffffffffffffffff, 0x540a, 0x2) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:37 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) [ 1125.170014] FAULT_INJECTION: forcing a failure. [ 1125.170014] name failslab, interval 1, probability 0, space 0, times 0 [ 1125.172477] CPU: 1 PID: 16320 Comm: syz-executor.1 Not tainted 5.10.194 #1 [ 1125.173868] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1125.175541] Call Trace: [ 1125.176081] dump_stack+0x107/0x167 [ 1125.176815] should_fail.cold+0x5/0xa [ 1125.177588] ? kvmalloc_node+0x119/0x170 [ 1125.178412] should_failslab+0x5/0x20 [ 1125.179187] __kmalloc_node+0x76/0x420 [ 1125.179982] ? __lock_acquire+0xbb1/0x5b00 [ 1125.180859] kvmalloc_node+0x119/0x170 [ 1125.181653] seq_read_iter+0x81c/0x12b0 [ 1125.182467] ? perf_trace_lock+0xac/0x490 [ 1125.183337] ? SOFTIRQ_verbose+0x10/0x10 [ 1125.184176] proc_reg_read_iter+0x20a/0x2e0 [ 1125.185062] new_sync_read+0x424/0x6f0 [ 1125.185856] ? ksys_lseek+0x1b0/0x1b0 [ 1125.186631] ? _cond_resched+0x12/0x80 [ 1125.187436] ? avc_policy_seqno+0x9/0x70 [ 1125.188257] ? selinux_file_permission+0x92/0x520 [ 1125.189254] vfs_read+0x457/0x580 [ 1125.189967] __x64_sys_pread64+0x201/0x260 [ 1125.190823] ? ksys_pread64+0x1b0/0x1b0 [ 1125.191635] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1125.192693] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1125.193741] do_syscall_64+0x33/0x40 [ 1125.194499] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1125.195557] RIP: 0033:0x7fcc35d8fb19 [ 1125.196305] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1125.199961] RSP: 002b:00007fcc33305188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1125.201488] RAX: ffffffffffffffda RBX: 00007fcc35ea2f60 RCX: 00007fcc35d8fb19 [ 1125.202903] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000005 [ 1125.204346] RBP: 00007fcc333051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1125.205764] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1125.207225] R13: 00007ffc32fae21f R14: 00007fcc33305300 R15: 0000000000022000 03:25:37 executing program 5: r0 = fork() ptrace(0x10, r0) waitid(0x2, 0x0, &(0x7f0000000600), 0x8, &(0x7f00000003c0)) ptrace$setsig(0x4203, r0, 0x902, &(0x7f0000000000)={0x1d, 0xc9, 0x40}) 03:25:37 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:37 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r1 = fsmount(r0, 0x0, 0xe) r2 = openat(r1, &(0x7f0000000100)='./file1\x00', 0x434b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r2, 0xffffffffffffffff, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0x100000001) openat2(r3, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') preadv(r4, &(0x7f0000000080)=[{&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/150, 0x96}, {&(0x7f00000013c0)=""/140, 0x8c}, {&(0x7f0000001480)=""/223, 0xdf}], 0x4, 0x401, 0xffffffff) pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) 03:25:37 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:37 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:52 executing program 0: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) r3 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x6c) dup2(r3, 0xffffffffffffffff) ioctl$BLKROTATIONAL(r3, 0x127e, &(0x7f0000000080)) r4 = openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r5 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r5, &(0x7f0000000240)=""/83, 0x53, 0x200000048) fallocate(r4, 0x4, 0x3847, 0x7fffffff) 03:25:52 executing program 5: r0 = fork() r1 = getpid() r2 = getpgid(0x0) r3 = epoll_create(0x1) r4 = socket$inet_tcp(0x2, 0x1, 0x0) epoll_ctl$EPOLL_CTL_ADD(r3, 0x1, r4, &(0x7f00000000c0)) kcmp$KCMP_EPOLL_TFD(r1, r2, 0x7, r3, &(0x7f0000000040)={r3, r4}) ptrace$getsig(0x4202, r2, 0x9, &(0x7f0000000000)) ptrace(0x10, r0) waitid(0x0, 0x0, &(0x7f0000000600), 0x40000000, &(0x7f00000003c0)) ptrace$setopts(0xffffffffffffffff, 0xffffffffffffffff, 0x200, 0x20) 03:25:52 executing program 1: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x100000001) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r1, &(0x7f0000000240)=""/83, 0x53, 0x0) (fail_nth: 2) 03:25:52 executing program 7: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x0) ioctl$TCSETSF(r0, 0x5404, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, "a7a671d82cbd13c6b5b0adbe62956740f9b182"}) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, r0, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000140)=0x7, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:52 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) 03:25:52 executing program 3: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x200000048) ioctl$BTRFS_IOC_DEFRAG_RANGE(r1, 0x40309410, &(0x7f0000000080)={0x8, 0xf21b, 0x2, 0x401, 0x2, [0x6, 0x3, 0x7, 0x10001]}) 03:25:52 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x9286, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1140.426069] FAULT_INJECTION: forcing a failure. [ 1140.426069] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.428580] CPU: 1 PID: 16461 Comm: syz-executor.1 Not tainted 5.10.194 #1 [ 1140.430078] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1140.431877] Call Trace: [ 1140.432453] dump_stack+0x107/0x167 [ 1140.433255] should_fail.cold+0x5/0xa [ 1140.434089] ? create_object.isra.0+0x3a/0xa20 [ 1140.435081] should_failslab+0x5/0x20 [ 1140.435935] kmem_cache_alloc+0x5b/0x310 [ 1140.436832] create_object.isra.0+0x3a/0xa20 [ 1140.437781] ? __kasan_kmalloc.constprop.0+0xc9/0xd0 [ 1140.438888] __kmalloc_node+0x1ae/0x420 [ 1140.439754] ? __lock_acquire+0xbb1/0x5b00 [ 1140.440687] kvmalloc_node+0x119/0x170 [ 1140.441531] seq_read_iter+0x81c/0x12b0 [ 1140.442394] ? perf_trace_lock+0xac/0x490 [ 1140.443298] ? SOFTIRQ_verbose+0x10/0x10 [ 1140.444205] proc_reg_read_iter+0x20a/0x2e0 [ 1140.445141] new_sync_read+0x424/0x6f0 [ 1140.445989] ? ksys_lseek+0x1b0/0x1b0 [ 1140.446820] ? _cond_resched+0x12/0x80 [ 1140.447684] ? avc_policy_seqno+0x9/0x70 [ 1140.448560] ? selinux_file_permission+0x92/0x520 [ 1140.449624] vfs_read+0x457/0x580 [ 1140.450383] __x64_sys_pread64+0x201/0x260 [ 1140.451308] ? ksys_pread64+0x1b0/0x1b0 [ 1140.452172] ? lockdep_hardirqs_on_prepare+0x277/0x3e0 [ 1140.453288] ? syscall_enter_from_user_mode+0x1d/0x50 [ 1140.454406] do_syscall_64+0x33/0x40 [ 1140.455217] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1140.456318] RIP: 0033:0x7fcc35d8fb19 [ 1140.457126] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1140.461087] RSP: 002b:00007fcc33305188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 1140.462733] RAX: ffffffffffffffda RBX: 00007fcc35ea2f60 RCX: 00007fcc35d8fb19 [ 1140.464273] RDX: 0000000000000053 RSI: 0000000020000240 RDI: 0000000000000005 [ 1140.465818] RBP: 00007fcc333051d0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.467361] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1140.468889] R13: 00007ffc32fae21f R14: 00007fcc33305300 R15: 0000000000022000 03:25:52 executing program 0: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x200, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) (fail_nth: 1) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) 03:25:52 executing program 2: openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5e, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCXONC(r0, 0x540a, 0x2) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000080)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x7}) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r1, &(0x7f0000002e00)={0x0, 0x0, &(0x7f0000000000)={&(0x7f0000001280)=@updsa={0x160, 0x10, 0x1, 0x0, 0x0, {{@in6=@mcast2, @in6=@private0}, {@in, 0x0, 0x32}, @in=@multicast1, {}, {}, {}, 0x0, 0x0, 0xa}, [@algo_aead={0x70, 0x12, {{'rfc4106(gcm(aes))\x00'}, 0x120, 0x40, "976ae46d07d1812fd0664e95dee18314b91df2e10ff98153074f6a02e3550c030000001b"}}]}, 0x160}}, 0x0) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) [ 1140.492349] FAULT_INJECTION: forcing a failure. [ 1140.492349] name failslab, interval 1, probability 0, space 0, times 0 [ 1140.494727] CPU: 0 PID: 16465 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 1140.495465] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1140.496339] Call Trace: [ 1140.496619] dump_stack+0x107/0x167 [ 1140.497014] should_fail.cold+0x5/0xa [ 1140.497421] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1140.497970] ? tty_buffer_alloc+0x243/0x2b0 [ 1140.498436] should_failslab+0x5/0x20 [ 1140.498837] __kmalloc+0x72/0x390 [ 1140.499233] tty_buffer_alloc+0x243/0x2b0 [ 1140.499670] __tty_buffer_request_room+0x156/0x2a0 [ 1140.500189] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1140.500772] ? trace_hardirqs_on+0x5b/0x180 [ 1140.501239] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1140.501864] pty_write+0xe6/0x110 [ 1140.502232] ? __sanitizer_cov_trace_pc+0x3c/0x60 [ 1140.502744] tty_send_xchar+0x29b/0x3c0 [ 1140.503168] ? tty_write_message+0x140/0x140 [ 1140.503634] ? __sanitizer_cov_trace_switch+0xe/0x80 [ 1140.504165] n_tty_ioctl_helper+0x191/0x3a0 [ 1140.504616] n_tty_ioctl+0x56/0x370 [ 1140.505000] tty_ioctl+0x912/0x18b0 [ 1140.505389] ? n_tty_write_wakeup+0x40/0x40 [ 1140.505840] ? tty_fasync+0x390/0x390 [ 1140.506248] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1140.506852] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1140.507409] ? do_vfs_ioctl+0x283/0x10d0 [ 1140.507837] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1140.508385] ? generic_block_fiemap+0x60/0x60 [ 1140.508865] ? clockevents_program_event+0x131/0x360 [ 1140.509402] ? selinux_file_ioctl+0xb6/0x270 [ 1140.509871] ? tty_fasync+0x390/0x390 [ 1140.510274] __x64_sys_ioctl+0x19a/0x210 [ 1140.510710] do_syscall_64+0x33/0x40 [ 1140.511101] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1140.511649] RIP: 0033:0x7f9a5e6c3b19 [ 1140.512042] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1140.513961] RSP: 002b:00007f9a5bc39188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1140.514769] RAX: ffffffffffffffda RBX: 00007f9a5e7d6f60 RCX: 00007f9a5e6c3b19 [ 1140.515522] RDX: 0000000000000002 RSI: 000000000000540a RDI: 0000000000000004 [ 1140.516263] RBP: 00007f9a5bc391d0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.517068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1140.517912] R13: 00007ffd33e53c7f R14: 00007f9a5bc39300 R15: 0000000000022000 [ 1140.518688] [ 1140.518693] ====================================================== [ 1140.518697] WARNING: possible circular locking dependency detected [ 1140.518700] 5.10.194 #1 Not tainted [ 1140.518704] ------------------------------------------------------ [ 1140.518707] syz-executor.0/16465 is trying to acquire lock: [ 1140.518711] ffffffff84f0c800 (console_owner){-.-.}-{0:0}, at: console_unlock+0x2e1/0xb40 [ 1140.518723] [ 1140.518726] but task is already holding lock: [ 1140.518728] ffff8880175ec958 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1140.518740] [ 1140.518744] which lock already depends on the new lock. [ 1140.518745] [ 1140.518747] [ 1140.518751] the existing dependency chain (in reverse order) is: [ 1140.518752] [ 1140.518754] -> #2 (&port->lock){-.-.}-{2:2}: [ 1140.518765] _raw_spin_lock_irqsave+0x36/0x60 [ 1140.518768] tty_port_tty_get+0x1f/0x100 [ 1140.518771] tty_port_default_wakeup+0x11/0x40 [ 1140.518774] serial8250_tx_chars+0x51f/0xb00 [ 1140.518777] serial8250_handle_irq+0x4d6/0x650 [ 1140.518780] serial8250_default_handle_irq+0x96/0x210 [ 1140.518783] serial8250_interrupt+0xf4/0x1b0 [ 1140.518787] __handle_irq_event_percpu+0x2ef/0x6d0 [ 1140.518790] handle_irq_event+0xff/0x280 [ 1140.518792] handle_edge_irq+0x249/0xd00 [ 1140.518795] asm_call_irq_on_stack+0x12/0x20 [ 1140.518798] common_interrupt+0xdd/0x1a0 [ 1140.518801] asm_common_interrupt+0x1e/0x40 [ 1140.518804] default_idle+0xe/0x20 [ 1140.518807] default_idle_call+0xbf/0x2c0 [ 1140.518809] do_idle+0x3ad/0x520 [ 1140.518812] cpu_startup_entry+0x14/0x20 [ 1140.518816] secondary_startup_64_no_verify+0xc2/0xcb [ 1140.518817] [ 1140.518819] -> #1 (&port_lock_key){-.-.}-{2:2}: [ 1140.518830] _raw_spin_lock_irqsave+0x36/0x60 [ 1140.518833] serial8250_console_write+0x9f5/0xc60 [ 1140.518836] console_unlock+0x82a/0xb40 [ 1140.518839] register_console+0x53d/0x800 [ 1140.518842] univ8250_console_init+0x3a/0x4a [ 1140.518845] console_init+0x24c/0x356 [ 1140.518847] start_kernel+0x2e6/0x489 [ 1140.518851] secondary_startup_64_no_verify+0xc2/0xcb [ 1140.518852] 03:25:52 executing program 4: openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x105142, 0x0) r0 = openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) perf_event_open(&(0x7f0000001d80)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() sendfile(r0, 0xffffffffffffffff, 0x0, 0x100000001) r1 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r1, r2, 0x0, 0x100000001) openat2(r1, &(0x7f0000000040)='./file1\x00', &(0x7f0000000140)={0xd8e00, 0x93, 0x13}, 0x18) r3 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r3, &(0x7f0000000240)=""/83, 0x53, 0x2f) [ 1140.518854] -> #0 (console_owner){-.-.}-{0:0}: [ 1140.518865] __lock_acquire+0x29e7/0x5b00 [ 1140.518868] lock_acquire+0x197/0x470 [ 1140.518870] console_unlock+0x360/0xb40 [ 1140.518873] vprintk_emit+0x1de/0x4d0 [ 1140.518876] vprintk_func+0x8b/0x140 [ 1140.518878] printk+0xba/0xf1 [ 1140.518881] should_fail+0x47a/0x5a0 [ 1140.518884] should_failslab+0x5/0x20 [ 1140.518886] __kmalloc+0x72/0x390 [ 1140.518889] tty_buffer_alloc+0x243/0x2b0 [ 1140.518892] __tty_buffer_request_room+0x156/0x2a0 [ 1140.518896] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1140.518900] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1140.518902] pty_write+0xe6/0x110 [ 1140.518905] tty_send_xchar+0x29b/0x3c0 [ 1140.518908] n_tty_ioctl_helper+0x191/0x3a0 [ 1140.518911] n_tty_ioctl+0x56/0x370 [ 1140.518913] tty_ioctl+0x912/0x18b0 [ 1140.518916] __x64_sys_ioctl+0x19a/0x210 [ 1140.518919] do_syscall_64+0x33/0x40 [ 1140.518922] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1140.518924] [ 1140.518927] other info that might help us debug this: [ 1140.518928] [ 1140.518930] Chain exists of: [ 1140.518932] console_owner --> &port_lock_key --> &port->lock [ 1140.518946] [ 1140.518948] Possible unsafe locking scenario: [ 1140.518950] [ 1140.518953] CPU0 CPU1 [ 1140.518956] ---- ---- [ 1140.518957] lock(&port->lock); [ 1140.518964] lock(&port_lock_key); [ 1140.518971] lock(&port->lock); [ 1140.518977] lock(console_owner); [ 1140.518983] [ 1140.518985] *** DEADLOCK *** [ 1140.518986] [ 1140.518989] 5 locks held by syz-executor.0/16465: [ 1140.518991] #0: ffff888047a3b098 (&tty->ldisc_sem){++++}-{0:0}, at: tty_ldisc_ref_wait+0x22/0x90 [ 1140.519005] #1: ffff888047a3b130 (&tty->atomic_write_lock){+.+.}-{3:3}, at: tty_send_xchar+0x1e2/0x3c0 [ 1140.519019] #2: ffff888047a3b2e8 (&tty->termios_rwsem){++++}-{3:3}, at: tty_send_xchar+0x22f/0x3c0 [ 1140.519032] #3: ffff8880175ec958 (&port->lock){-.-.}-{2:2}, at: tty_insert_flip_string_and_push_buffer+0x2b/0x160 [ 1140.519046] #4: ffffffff84fecb80 (console_lock){+.+.}-{0:0}, at: vprintk_func+0x8b/0x140 [ 1140.519059] [ 1140.519062] stack backtrace: [ 1140.519066] CPU: 0 PID: 16465 Comm: syz-executor.0 Not tainted 5.10.194 #1 [ 1140.519070] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1140.519072] Call Trace: [ 1140.519075] dump_stack+0x107/0x167 [ 1140.519077] check_noncircular+0x263/0x2e0 [ 1140.519080] ? stack_trace_consume_entry+0x160/0x160 [ 1140.519083] ? print_circular_bug+0x470/0x470 [ 1140.519085] ? memcpy+0x39/0x60 [ 1140.519088] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 1140.519091] __lock_acquire+0x29e7/0x5b00 [ 1140.519094] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1140.519097] ? SOFTIRQ_verbose+0x10/0x10 [ 1140.519100] ? __lockdep_reset_lock+0x180/0x180 [ 1140.519102] lock_acquire+0x197/0x470 [ 1140.519105] ? console_unlock+0x2e1/0xb40 [ 1140.519107] ? lock_release+0x680/0x680 [ 1140.519110] ? lock_downgrade+0x6d0/0x6d0 [ 1140.519113] ? do_raw_spin_lock+0x121/0x260 [ 1140.519115] ? rwlock_bug.part.0+0x90/0x90 [ 1140.519118] console_unlock+0x360/0xb40 [ 1140.519120] ? console_unlock+0x2e1/0xb40 [ 1140.519123] ? devkmsg_read+0x730/0x730 [ 1140.519126] ? lock_release+0x680/0x680 [ 1140.519128] ? do_raw_spin_unlock+0x4f/0x220 [ 1140.519131] ? vprintk_func+0x8b/0x140 [ 1140.519133] vprintk_emit+0x1de/0x4d0 [ 1140.519136] vprintk_func+0x8b/0x140 [ 1140.519138] printk+0xba/0xf1 [ 1140.519141] ? record_print_text.cold+0x16/0x16 [ 1140.519143] should_fail+0x47a/0x5a0 [ 1140.519146] ? lockdep_hardirqs_on_prepare+0x3e0/0x3e0 [ 1140.519149] ? tty_buffer_alloc+0x243/0x2b0 [ 1140.519152] should_failslab+0x5/0x20 [ 1140.519154] __kmalloc+0x72/0x390 [ 1140.519170] tty_buffer_alloc+0x243/0x2b0 [ 1140.519173] __tty_buffer_request_room+0x156/0x2a0 [ 1140.519177] tty_insert_flip_string_fixed_flag+0x91/0x250 [ 1140.519180] ? trace_hardirqs_on+0x5b/0x180 [ 1140.519183] tty_insert_flip_string_and_push_buffer+0x3e/0x160 [ 1140.519185] pty_write+0xe6/0x110 [ 1140.519188] ? __sanitizer_cov_trace_pc+0x3c/0x60 [ 1140.519191] tty_send_xchar+0x29b/0x3c0 [ 1140.519194] ? tty_write_message+0x140/0x140 [ 1140.519197] ? __sanitizer_cov_trace_switch+0xe/0x80 [ 1140.519199] n_tty_ioctl_helper+0x191/0x3a0 [ 1140.519202] n_tty_ioctl+0x56/0x370 [ 1140.519204] tty_ioctl+0x912/0x18b0 [ 1140.519207] ? n_tty_write_wakeup+0x40/0x40 [ 1140.519209] ? tty_fasync+0x390/0x390 [ 1140.519213] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x410 [ 1140.519216] ? __sanitizer_cov_trace_switch+0x45/0x80 [ 1140.519218] ? do_vfs_ioctl+0x283/0x10d0 [ 1140.519221] ? selinux_bprm_creds_for_exec+0xb60/0xb60 [ 1140.519224] ? generic_block_fiemap+0x60/0x60 [ 1140.519227] ? clockevents_program_event+0x131/0x360 [ 1140.519230] ? selinux_file_ioctl+0xb6/0x270 [ 1140.519233] ? tty_fasync+0x390/0x390 [ 1140.519235] __x64_sys_ioctl+0x19a/0x210 [ 1140.519238] do_syscall_64+0x33/0x40 [ 1140.519241] entry_SYSCALL_64_after_hwframe+0x62/0xc7 [ 1140.519243] RIP: 0033:0x7f9a5e6c3b19 [ 1140.519253] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1140.519256] RSP: 002b:00007f9a5bc39188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 1140.519263] RAX: ffffffffffffffda RBX: 00007f9a5e7d6f60 RCX: 00007f9a5e6c3b19 [ 1140.519267] RDX: 0000000000000002 RSI: 000000000000540a RDI: 0000000000000004 [ 1140.519271] RBP: 00007f9a5bc391d0 R08: 0000000000000000 R09: 0000000000000000 [ 1140.519275] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1140.519279] R13: 00007ffd33e53c7f R14: 00007f9a5bc39300 R15: 0000000000022000 03:25:52 executing program 6: openat(0xffffffffffffffff, &(0x7f0000000100)='./file1\x00', 0x535b43, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x88) perf_event_open(&(0x7f0000001d80)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4307, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) getpid() r0 = openat(0xffffffffffffff9c, &(0x7f00000002c0)='.\x00', 0x220002, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='/proc/self/exe\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x100000001) r2 = syz_open_procfs(0x0, &(0x7f0000000040)='net/ip6_tables_matches\x00') pread64(r2, &(0x7f0000000240)=""/83, 0x53, 0x2f) VM DIAGNOSIS: 03:25:52 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822c7201 RDI=ffffffff879e61a0 RBP=ffffffff879e6160 RSP=ffff88806ce09c90 R8 =0000000000000001 R9 =0000000000000003 R10=0000000000000000 R11=0000000000000001 R12=0000000000000020 R13=0000000000000020 R14=ffffffff879e6160 R15=dffffc0000000000 RIP=ffffffff822c7258 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f9a5bc39700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f9a5bc38f78 CR3=0000000049102000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=ffffffffffffffffffffffffffffff00 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=ffffffff814cd1b5 RBX=dffffc0000000000 RCX=ffffffff8141a08f RDX=0000000000000000 RSI=ffffffff814cd1ba RDI=ffffffff84bda340 RBP=ffff88800fc4fcd0 RSP=ffff88800fc4fc00 R8 =0000000000000000 R9 =0000000000000000 R10=000000007fff0000 R11=0000000000000001 R12=00000000000000ac R13=ffffed1001f89f9c R14=ffffc9000069f000 R15=ffffc9000069f038 RIP=ffffffff81408224 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fc583c798c0 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fc9d2d3b4b8 CR3=000000000c8b8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=000000000000002f002f2e2e2f002e2e XMM01=0000000000000000696c61766e49002f XMM02=ffffffffffffff0f0e0d0c0b0a090807 XMM03=0000000000000000000030706f6f6c2f XMM04=2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f2f XMM05=00000000000000000000000000000000 XMM06=000055e216f8b72000000000ffffffff XMM07=00000000000000000000000000000000 XMM08=2f63697361622f6372732f2e2e000d0a XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000