00002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r0, r1, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) 00:16:37 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="8780e2d18189502a32300c0200094016ab"], 0x7) 00:16:37 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000240)=ANY=[@ANYBLOB="00f78622783d23fc238a1d2147c1c4efaceaeba3002bef7184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038212e0000710d0f9b7d5e0f1f834c5a9b602ac6"]) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000900)={&(0x7f0000000400)=@abs, 0x6e, &(0x7f00000007c0)=[{&(0x7f0000000480)=""/104, 0x68}, {&(0x7f0000000500)=""/223, 0xdf}, {&(0x7f0000001200)=""/245, 0xf5}, {&(0x7f0000001480)=""/17, 0x11}, {&(0x7f0000001400)=""/85, 0x55}], 0x5, &(0x7f0000001300)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xe0}, 0x20) perf_event_open(&(0x7f0000000600)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) r5 = dup(r4) r6 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) r7 = fcntl$dupfd(r6, 0x0, r6) sendmsg$TIPC_CMD_SHOW_PORTS(r1, &(0x7f0000000680)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f00000003c0)={&(0x7f00000001c0)={0x1c, 0x0, 0x100, 0x70bd25, 0x25dfdbfe, {}, ["", "", "", "", "", "", "", "", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x4000000}, 0x4894) getsockopt$IP_VS_SO_GET_SERVICE(r7, 0x0, 0x483, 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r7, 0x2402, 0x3f) syz_open_dev$sg(&(0x7f0000001080), 0x8, 0x200) ioctl$PERF_EVENT_IOC_ID(r7, 0x80082407, &(0x7f00000014c0)) ioctl$FIGETBSZ(r5, 0x2, &(0x7f0000000140)) open$dir(&(0x7f0000001040)='./file0\x00', 0x600000, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r3, 0xc0189377, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r0, {0x0, 0x9}}, './file0\x00'}) copy_file_range(r8, &(0x7f0000000700), r5, &(0x7f0000000740)=0x9, 0x3, 0x0) sendfile(r2, r5, &(0x7f00000000c0)=0x3, 0x6b) ioctl$SG_IO(r5, 0x2285, &(0x7f0000000a40)={0x0, 0xfffffffffffffffb, 0xfe, 0x6, @buffer={0x0, 0xed, &(0x7f00000002c0)=""/237}, &(0x7f0000000940)="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", &(0x7f0000001140)=""/131, 0x97, 0x10000, 0x2, &(0x7f0000000080)}) fork() 00:16:37 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r0, r1, 0x0) [ 708.974973] No source specified [ 709.000468] No source specified 00:16:37 executing program 2: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:16:37 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) mkdirat(r0, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:16:37 executing program 3: mount(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x40001) ioctl$TIOCSBRK(r0, 0x5427) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = dup2(r1, r0) write$binfmt_aout(r2, &(0x7f0000000080)=ANY=[], 0x2e) [ 709.211664] No source specified 00:16:37 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x3, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="374e3afde5d01fbdedfe85ce2571fe45faed231fbfa9700259d24dfd1bed2739fdd2fd4aa20ee4f758456eea53278640b19fa198e8c1ee8dd1f4a2a68fbeb071fdc380c7c613ddf5c237b77f244090d9ca3b9694ebef76c9982c9ffffef4f9ac90b0de660f98819d0fc0cf19b1501f2f2f81a132f197f98b24dc60ecf0a2a91798e25d539be8454b4d75e6eb323123584cbe208c3940"], 0x7) 00:16:38 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) [ 709.321974] sg_write: data in/out 3171656/4 bytes for SCSI command 0x0-- guessing data in; [ 709.321974] program syz-executor.3 not setting count and/or reply_len properly 00:16:38 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) [ 709.429747] No source specified 00:16:38 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:16:38 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:16:38 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:16:38 executing program 1: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:16:38 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x1c) pread64(r1, &(0x7f0000000300)=""/188, 0xbc, 0xda) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="01000000010000001800000069bbf9b8bf2da1abde1ca1d373ee4c70840afedb2b2c26337a8c62aecc2eb9f1234953cb72823b1d1bfef19a8c93520d631f13edd5de9a107aeeeddd020335ac05ad11bfa840485cbc50a41b045658b0aa05777662947194a4425b6d5392661dc5ff7da10c8b3e9f1032d530daa7b6d603cd429b2e26d224229a6ec38f135f49f152938a5ad684127162c9c184660a5ce489d2d2344ecf11b442731c1c94fe7864439e888904e2b17cde1af5087a4bf7f062f214f6235b09bf44b1477ae8bb64efe12fec137e8b5df32bedc9a9b8014250b719b10a8c45307524b6f73f25fc5b03c2c28d363e9d4bfe57231673212b745b008a94a7d2173b55a4c0c3923055b667d712e0876536948d21013f8a97292b12c57869fa1ce3ea74523bd618e9e650a3e869659a62335fdad922557bb78eec532b4ea5c5dd48d0b3663541", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002e2f66696c65300029bb0cfe58bb6d055582b93935"]) close_range(r2, r3, 0x2) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r5, 0x0, r6, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r7, r7, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000003c0)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 709.632121] No source specified [ 709.657805] No source specified 00:16:49 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:16:49 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:16:49 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = accept$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x0, 0x0, @remote}, &(0x7f00000002c0)=0x1c) pread64(r1, &(0x7f0000000300)=""/188, 0xbc, 0xda) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r2 = pidfd_getfd(0xffffffffffffffff, r0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/syz0\x00', 0x1ff) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f00000004c0)=ANY=[@ANYBLOB="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", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="000000002e2f66696c65300029bb0cfe58bb6d055582b93935"]) close_range(r2, r3, 0x2) r5 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r6 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r5, 0x0, r6, 0x0, 0x0, 0x0) r7 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r7, r7, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r4, 0xc0502100, &(0x7f00000003c0)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 00:16:49 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:16:49 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:16:49 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:16:49 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) r5 = openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) r6 = fork() r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r8, 0x0) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) r10 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000000)="3f9f37a9c21bc3d85f1346df68d14bb6eff9fa9cda49d8977bc50015c3ede60872e88665718e0cc635392ecc8507da39b76bfa1466044a77614bd3c2d280b04e6300cc3b1b04152870dc", 0x4a}, {&(0x7f0000000080)="0f9987eb0c1b263298fda073e0bdae1ee5775d3726e3336ea471e467e4ebb43e30530000000a00000000", 0x2a}, {&(0x7f00000000c0)="96bd8c9bf8ccbe82658938288e355c82917468113931f50bcf4892ff2c68a9c1cbde667ddc249888411795d2f96324519434287f5c59d1e854c84fcafa5707154fdb57e4075df2fc4650fd1da5f36cbb72c171dc8f5b94358800de6902036e8830", 0x61}, {&(0x7f0000000140)="dc069c1e6d738b410ac4f1a9af0e060777d489dc307db3dd70c7590e3bbe323aaffd7471af11aebc799181a985b205afc6576b5c5ba9be9e380f10e6ff4b50a525d64576de78a121c9678e6cd06b9a24ae50dfe1af448acb64ced832d5258c6694289524311808989b1cb3e9089993b5d50578f67834badda23072a309ecbe1e66211f", 0x83}, {&(0x7f0000000200)="accb7ac8ccde16976fbe60a5c5ff0b6dbfff3d76ee408d409bdefa239db8c701d34f512b9a710765964a17bd07e35b206f9043198ac2868b7ac390b5bd3f2feeef0bf58c4d50a36d6712522a83748a11f266c883bdb03fea03f8e4041072997aac3693d151d1b89ff21488c544e36b7e10115d7a7c90f9063b0570819ed84726cc38e578b64bde450282a5d5d347c16eef142dbd0fe4021876ca4bc370096ed6968704213e16c816e216b38adb53cb44b9c1d324800273252d3310798a6aad8274eaf65fd870968eb2cded79e63b92084aa5a4deba0be6a6d2b933d8", 0xdc}, {&(0x7f00000003c0)="fa823948c2649e121ddc455e42e6c76f71b83f415e3776c167add9953ed7c4ac682eb57a7c7a4b3b85b2bf33290f05d289c43330ec56d9a54bd09e8be6ad9f39c3d8b914a37a38b7ef8b6fa1cda44e062a02a08b6d2faf9a7841c8284dcda06a462c8bb776b18763f96b0372af9a34f748bc703bccf96c2a2bd20f93600a6ad1c238d5ff06b4116eae7f8a0c2bae9e4e6d6f823dc133e88f453beae14747a96ca4a69f47bafd0e0461177537668d6d21da25f8a18e39812945c2dfa63e5e145f5641e978510ea4182b97d2241dabc5d1bda190df0b368ef120fbe974a68622a4c9615eb53fe0f3c3e401bc8ea4ae136a8beb77ee64e708c1", 0xf8}, {&(0x7f00000004c0)="d48a9854af1e4a556995876a1aecae4a8ebcb441bfabd8f300a1d09f5d45588b42d2b495d81d2d31d0c307bd29c6177430009b326d6b0667c48a637a968b2bd89579a0ed7d73aa8e9bbf582744406f7eef6ac75ce4c38e3d88edd6505e44551f9736f2d6660fc39dbc3e5637492d2d17cea14445d52423cfbb2919bb732217d2249178b111a413373807ab0f039a", 0x8e}, {&(0x7f0000000580)="586015d890c1754bee4642510a8d79aea9e475a022bdc1add7333a4d258f52a8e82aa3cadc35eab8d17c84997f25a82af4a6bc5c11e51b84eedfddee905814092ab2e82651bd0a6d35024e8e1b237cd6358f44407ef4346130dcef2ee33483aeb889f2a0b4dbbfd932cfd9f9ffe9723e2d7df63936c3d1efa4b0c64dc438b764a7d159c39f327712797a8a8290b7fa0dfec622185532dc143fb899b53f5c0b161d2680d991df015651c57ae257fa27edbb6a48b4", 0xb4}, {&(0x7f0000000640)="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", 0xfd}], 0x9, &(0x7f0000000b00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r1, r3, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r8}}}, @rights={{0x18, 0x1, 0x1, [r0, r9]}}, @rights={{0x24, 0x1, 0x1, [r10, r0, r0, r0, r0]}}], 0x128, 0x4000010}, 0x24004040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r11, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3, 0x0) 00:16:49 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000001c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000300)=ANY=[@ANYBLOB="01000000dba5fe3a61c44a79ea97bd07a04747b91dea27d9924af1f76218408fe886f5ea4daba15e7575e4c4da05416431d2f62861e62c6ff587bffaff55abd6eef9a2abd49028c5318044d640bead848846a2f735", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00./file0\x00']) io_submit(0x0, 0x3, &(0x7f00000002c0)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x3, 0xff, 0xffffffffffffffff, &(0x7f0000000000)="8c4953217f84bba786848cfb3e82562139beddec11eee22e4902be2fc7081ae8d9ee9e8fca4273fb5fbcec7bad57bc6691ec6b9596", 0x35, 0x200, 0x0, 0x1}, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x2, 0x3, 0xffffffffffffffff, &(0x7f0000000140)="2b5cc933476f993d16e6e819f2999c221345c0497b5096d0f9d46c300fadeb83ec975d4f4b08146a180884e941b7904504d56d986f94c819ddc5473d0d517c4fd72cb1", 0x43, 0x0, 0x0, 0x3}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x3, 0x74dc, r0, &(0x7f0000000200)="4e478befcd9f4f052f6b2c1e28c7b2710d2bbcc71bb13645", 0x18, 0x1, 0x0, 0x0, r1}]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="040f046c2f94e8aefcabaf236cac8333de71bcb6d705a088d8174963c912d0750c520ae53ecfe0d1d9a5671f807ba0ba5d2739b16e283a7906b9f67787c5ed9e1e614fba000d11cc6cba7a67dc84ee413901688410b6e086dfd60c183d84e06486131c94728e7ebe1348eba96cb72ecae0ddc8a537"], 0x7) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() r5 = fork() kcmp(r4, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r6 = getpid() setpgid(r5, r6) r7 = syz_open_procfs(r5, &(0x7f0000000480)='net/route\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r7, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000b00)={0xffffffffffffffff, 0x5, 0x5, 0x390672c8}) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) recvmmsg$unix(r0, &(0x7f0000002940)=[{{&(0x7f0000000380), 0x6e, &(0x7f0000000240)=[{&(0x7f0000002f00)=""/140, 0x8c}, {&(0x7f00000004c0)=""/176, 0xb0}], 0x2, &(0x7f0000000580)=[@cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x140}}, {{0x0, 0x0, &(0x7f0000000400)=[{&(0x7f00000006c0)=""/61, 0x3d}, {&(0x7f0000000700)=""/60, 0x3c}, {&(0x7f0000000740)=""/66, 0x42}, {&(0x7f00000007c0)=""/181, 0xb5}, {&(0x7f0000000880)=""/99, 0x63}, {&(0x7f0000000900)=""/153, 0x99}, {&(0x7f00000009c0)=""/161, 0xa1}, {&(0x7f0000000a80)=""/111, 0x6f}], 0x8, &(0x7f0000000b80)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x58}}, {{&(0x7f0000000c00), 0x6e, &(0x7f00000017c0)=[{&(0x7f0000000c80)=""/245, 0xf5}, {&(0x7f0000000d80)=""/159, 0x9f}, {&(0x7f0000000e40)=""/92, 0x5c}, {&(0x7f0000000ec0)=""/229, 0xe5}, {&(0x7f0000002fc0)=""/253, 0xfd}, {&(0x7f0000002c40)=""/237, 0xed}, {&(0x7f0000002d40)=""/136, 0x88}, {&(0x7f0000002e00)=""/234, 0xea}], 0x8, &(0x7f0000001000)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}}, {{&(0x7f00000010c0), 0x6e, &(0x7f0000001300)=[{&(0x7f0000001140)=""/86, 0x56}, {&(0x7f00000011c0)=""/50, 0x32}, {&(0x7f0000001200)=""/205, 0xcd}], 0x3}}, {{&(0x7f0000001340)=@abs, 0x6e, &(0x7f0000001540)=[{&(0x7f00000013c0)=""/151, 0x97}, {&(0x7f0000001480)=""/8, 0x8}, {&(0x7f00000014c0)=""/70, 0x46}], 0x3, &(0x7f00000030c0)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x10}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}], 0x140}}, {{&(0x7f00000016c0)=@abs, 0x6e, &(0x7f00000028c0)=[{&(0x7f0000001740)=""/91, 0x5b}, {&(0x7f0000002ac0)=""/109, 0x6d}, {&(0x7f0000001840)=""/3, 0x3}, {&(0x7f0000001880)=""/7, 0x7}, {&(0x7f00000018c0)=""/4096, 0x1000}], 0x5}}], 0x6, 0x0, 0x0) 00:16:49 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) [ 720.499848] cgroup: fork rejected by pids controller in /syz1 00:16:49 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:16:49 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:16:49 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) r5 = openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) r6 = fork() r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r8, 0x0) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) r10 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000000)="3f9f37a9c21bc3d85f1346df68d14bb6eff9fa9cda49d8977bc50015c3ede60872e88665718e0cc635392ecc8507da39b76bfa1466044a77614bd3c2d280b04e6300cc3b1b04152870dc", 0x4a}, {&(0x7f0000000080)="0f9987eb0c1b263298fda073e0bdae1ee5775d3726e3336ea471e467e4ebb43e30530000000a00000000", 0x2a}, {&(0x7f00000000c0)="96bd8c9bf8ccbe82658938288e355c82917468113931f50bcf4892ff2c68a9c1cbde667ddc249888411795d2f96324519434287f5c59d1e854c84fcafa5707154fdb57e4075df2fc4650fd1da5f36cbb72c171dc8f5b94358800de6902036e8830", 0x61}, {&(0x7f0000000140)="dc069c1e6d738b410ac4f1a9af0e060777d489dc307db3dd70c7590e3bbe323aaffd7471af11aebc799181a985b205afc6576b5c5ba9be9e380f10e6ff4b50a525d64576de78a121c9678e6cd06b9a24ae50dfe1af448acb64ced832d5258c6694289524311808989b1cb3e9089993b5d50578f67834badda23072a309ecbe1e66211f", 0x83}, {&(0x7f0000000200)="accb7ac8ccde16976fbe60a5c5ff0b6dbfff3d76ee408d409bdefa239db8c701d34f512b9a710765964a17bd07e35b206f9043198ac2868b7ac390b5bd3f2feeef0bf58c4d50a36d6712522a83748a11f266c883bdb03fea03f8e4041072997aac3693d151d1b89ff21488c544e36b7e10115d7a7c90f9063b0570819ed84726cc38e578b64bde450282a5d5d347c16eef142dbd0fe4021876ca4bc370096ed6968704213e16c816e216b38adb53cb44b9c1d324800273252d3310798a6aad8274eaf65fd870968eb2cded79e63b92084aa5a4deba0be6a6d2b933d8", 0xdc}, {&(0x7f00000003c0)="fa823948c2649e121ddc455e42e6c76f71b83f415e3776c167add9953ed7c4ac682eb57a7c7a4b3b85b2bf33290f05d289c43330ec56d9a54bd09e8be6ad9f39c3d8b914a37a38b7ef8b6fa1cda44e062a02a08b6d2faf9a7841c8284dcda06a462c8bb776b18763f96b0372af9a34f748bc703bccf96c2a2bd20f93600a6ad1c238d5ff06b4116eae7f8a0c2bae9e4e6d6f823dc133e88f453beae14747a96ca4a69f47bafd0e0461177537668d6d21da25f8a18e39812945c2dfa63e5e145f5641e978510ea4182b97d2241dabc5d1bda190df0b368ef120fbe974a68622a4c9615eb53fe0f3c3e401bc8ea4ae136a8beb77ee64e708c1", 0xf8}, {&(0x7f00000004c0)="d48a9854af1e4a556995876a1aecae4a8ebcb441bfabd8f300a1d09f5d45588b42d2b495d81d2d31d0c307bd29c6177430009b326d6b0667c48a637a968b2bd89579a0ed7d73aa8e9bbf582744406f7eef6ac75ce4c38e3d88edd6505e44551f9736f2d6660fc39dbc3e5637492d2d17cea14445d52423cfbb2919bb732217d2249178b111a413373807ab0f039a", 0x8e}, {&(0x7f0000000580)="586015d890c1754bee4642510a8d79aea9e475a022bdc1add7333a4d258f52a8e82aa3cadc35eab8d17c84997f25a82af4a6bc5c11e51b84eedfddee905814092ab2e82651bd0a6d35024e8e1b237cd6358f44407ef4346130dcef2ee33483aeb889f2a0b4dbbfd932cfd9f9ffe9723e2d7df63936c3d1efa4b0c64dc438b764a7d159c39f327712797a8a8290b7fa0dfec622185532dc143fb899b53f5c0b161d2680d991df015651c57ae257fa27edbb6a48b4", 0xb4}, {&(0x7f0000000640)="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", 0xfd}], 0x9, &(0x7f0000000b00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r1, r3, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r8}}}, @rights={{0x18, 0x1, 0x1, [r0, r9]}}, @rights={{0x24, 0x1, 0x1, [r10, r0, r0, r0, r0]}}], 0x128, 0x4000010}, 0x24004040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r11, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3, 0x0) 00:17:05 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:17:05 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f6e1c49b8b9"], 0x7) 00:17:05 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:05 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:05 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:05 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:05 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) r5 = openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) r6 = fork() r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r8, 0x0) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) r10 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000000)="3f9f37a9c21bc3d85f1346df68d14bb6eff9fa9cda49d8977bc50015c3ede60872e88665718e0cc635392ecc8507da39b76bfa1466044a77614bd3c2d280b04e6300cc3b1b04152870dc", 0x4a}, {&(0x7f0000000080)="0f9987eb0c1b263298fda073e0bdae1ee5775d3726e3336ea471e467e4ebb43e30530000000a00000000", 0x2a}, {&(0x7f00000000c0)="96bd8c9bf8ccbe82658938288e355c82917468113931f50bcf4892ff2c68a9c1cbde667ddc249888411795d2f96324519434287f5c59d1e854c84fcafa5707154fdb57e4075df2fc4650fd1da5f36cbb72c171dc8f5b94358800de6902036e8830", 0x61}, {&(0x7f0000000140)="dc069c1e6d738b410ac4f1a9af0e060777d489dc307db3dd70c7590e3bbe323aaffd7471af11aebc799181a985b205afc6576b5c5ba9be9e380f10e6ff4b50a525d64576de78a121c9678e6cd06b9a24ae50dfe1af448acb64ced832d5258c6694289524311808989b1cb3e9089993b5d50578f67834badda23072a309ecbe1e66211f", 0x83}, {&(0x7f0000000200)="accb7ac8ccde16976fbe60a5c5ff0b6dbfff3d76ee408d409bdefa239db8c701d34f512b9a710765964a17bd07e35b206f9043198ac2868b7ac390b5bd3f2feeef0bf58c4d50a36d6712522a83748a11f266c883bdb03fea03f8e4041072997aac3693d151d1b89ff21488c544e36b7e10115d7a7c90f9063b0570819ed84726cc38e578b64bde450282a5d5d347c16eef142dbd0fe4021876ca4bc370096ed6968704213e16c816e216b38adb53cb44b9c1d324800273252d3310798a6aad8274eaf65fd870968eb2cded79e63b92084aa5a4deba0be6a6d2b933d8", 0xdc}, {&(0x7f00000003c0)="fa823948c2649e121ddc455e42e6c76f71b83f415e3776c167add9953ed7c4ac682eb57a7c7a4b3b85b2bf33290f05d289c43330ec56d9a54bd09e8be6ad9f39c3d8b914a37a38b7ef8b6fa1cda44e062a02a08b6d2faf9a7841c8284dcda06a462c8bb776b18763f96b0372af9a34f748bc703bccf96c2a2bd20f93600a6ad1c238d5ff06b4116eae7f8a0c2bae9e4e6d6f823dc133e88f453beae14747a96ca4a69f47bafd0e0461177537668d6d21da25f8a18e39812945c2dfa63e5e145f5641e978510ea4182b97d2241dabc5d1bda190df0b368ef120fbe974a68622a4c9615eb53fe0f3c3e401bc8ea4ae136a8beb77ee64e708c1", 0xf8}, {&(0x7f00000004c0)="d48a9854af1e4a556995876a1aecae4a8ebcb441bfabd8f300a1d09f5d45588b42d2b495d81d2d31d0c307bd29c6177430009b326d6b0667c48a637a968b2bd89579a0ed7d73aa8e9bbf582744406f7eef6ac75ce4c38e3d88edd6505e44551f9736f2d6660fc39dbc3e5637492d2d17cea14445d52423cfbb2919bb732217d2249178b111a413373807ab0f039a", 0x8e}, {&(0x7f0000000580)="586015d890c1754bee4642510a8d79aea9e475a022bdc1add7333a4d258f52a8e82aa3cadc35eab8d17c84997f25a82af4a6bc5c11e51b84eedfddee905814092ab2e82651bd0a6d35024e8e1b237cd6358f44407ef4346130dcef2ee33483aeb889f2a0b4dbbfd932cfd9f9ffe9723e2d7df63936c3d1efa4b0c64dc438b764a7d159c39f327712797a8a8290b7fa0dfec622185532dc143fb899b53f5c0b161d2680d991df015651c57ae257fa27edbb6a48b4", 0xb4}, {&(0x7f0000000640)="c69cfbfa08495918517cb432f6c8184f6d56ca3fce16f9a35600abbf5767fcd6ffec8be86e3b8ab3627efd61471f4e05fcf4b5189ff606c356a566f1ad03d99e4c3674544026e24bfc33964a3bd5d843238fe0515ad339751a62f899d9b14ad519c627fe31dd792e4652f8eaa0a2c2482edd86cdb28feeb8a0758994e9f668ec606a58e07d05829757c5299e05188120e87e5a0a09c19feb75149484aa5e26bc11224670fc0da62fa885d3deb2b00031f695196b3469ce16caf662f69646532279d740d33b117520d9cc9a9ed05f2f645f2925da0c10a3dff5c2bc30b00488aac9211d92b51a62db17b9c497e0bae512e74bcda9b9b029d0b19d3fca49", 0xfd}], 0x9, &(0x7f0000000b00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r1, r3, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r8}}}, @rights={{0x18, 0x1, 0x1, [r0, r9]}}, @rights={{0x24, 0x1, 0x1, [r10, r0, r0, r0, r0]}}], 0x128, 0x4000010}, 0x24004040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r11, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3, 0x0) [ 736.631317] No source specified 00:17:05 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000180)=ANY=[@ANYBLOB="b90cd041fed39afa20"], 0x7) r0 = fork() r1 = fork() kcmp(r0, r1, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x20, 0x7, 0x9, 0x2, 0x0, 0x8, 0x8000, 0xc, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0x8, 0x5}, 0x4000, 0x4, 0x1, 0x1, 0x1000, 0x81, 0x6, 0x0, 0x2, 0x0, 0x8}, r0, 0x6, r3, 0xa) 00:17:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) [ 736.864358] No source specified 00:17:05 executing program 7: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:05 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:05 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) [ 737.074263] No source specified 00:17:05 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) r5 = openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) r6 = fork() r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r8, 0x0) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) r10 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000000)="3f9f37a9c21bc3d85f1346df68d14bb6eff9fa9cda49d8977bc50015c3ede60872e88665718e0cc635392ecc8507da39b76bfa1466044a77614bd3c2d280b04e6300cc3b1b04152870dc", 0x4a}, {&(0x7f0000000080)="0f9987eb0c1b263298fda073e0bdae1ee5775d3726e3336ea471e467e4ebb43e30530000000a00000000", 0x2a}, {&(0x7f00000000c0)="96bd8c9bf8ccbe82658938288e355c82917468113931f50bcf4892ff2c68a9c1cbde667ddc249888411795d2f96324519434287f5c59d1e854c84fcafa5707154fdb57e4075df2fc4650fd1da5f36cbb72c171dc8f5b94358800de6902036e8830", 0x61}, {&(0x7f0000000140)="dc069c1e6d738b410ac4f1a9af0e060777d489dc307db3dd70c7590e3bbe323aaffd7471af11aebc799181a985b205afc6576b5c5ba9be9e380f10e6ff4b50a525d64576de78a121c9678e6cd06b9a24ae50dfe1af448acb64ced832d5258c6694289524311808989b1cb3e9089993b5d50578f67834badda23072a309ecbe1e66211f", 0x83}, {&(0x7f0000000200)="accb7ac8ccde16976fbe60a5c5ff0b6dbfff3d76ee408d409bdefa239db8c701d34f512b9a710765964a17bd07e35b206f9043198ac2868b7ac390b5bd3f2feeef0bf58c4d50a36d6712522a83748a11f266c883bdb03fea03f8e4041072997aac3693d151d1b89ff21488c544e36b7e10115d7a7c90f9063b0570819ed84726cc38e578b64bde450282a5d5d347c16eef142dbd0fe4021876ca4bc370096ed6968704213e16c816e216b38adb53cb44b9c1d324800273252d3310798a6aad8274eaf65fd870968eb2cded79e63b92084aa5a4deba0be6a6d2b933d8", 0xdc}, {&(0x7f00000003c0)="fa823948c2649e121ddc455e42e6c76f71b83f415e3776c167add9953ed7c4ac682eb57a7c7a4b3b85b2bf33290f05d289c43330ec56d9a54bd09e8be6ad9f39c3d8b914a37a38b7ef8b6fa1cda44e062a02a08b6d2faf9a7841c8284dcda06a462c8bb776b18763f96b0372af9a34f748bc703bccf96c2a2bd20f93600a6ad1c238d5ff06b4116eae7f8a0c2bae9e4e6d6f823dc133e88f453beae14747a96ca4a69f47bafd0e0461177537668d6d21da25f8a18e39812945c2dfa63e5e145f5641e978510ea4182b97d2241dabc5d1bda190df0b368ef120fbe974a68622a4c9615eb53fe0f3c3e401bc8ea4ae136a8beb77ee64e708c1", 0xf8}, {&(0x7f00000004c0)="d48a9854af1e4a556995876a1aecae4a8ebcb441bfabd8f300a1d09f5d45588b42d2b495d81d2d31d0c307bd29c6177430009b326d6b0667c48a637a968b2bd89579a0ed7d73aa8e9bbf582744406f7eef6ac75ce4c38e3d88edd6505e44551f9736f2d6660fc39dbc3e5637492d2d17cea14445d52423cfbb2919bb732217d2249178b111a413373807ab0f039a", 0x8e}, {&(0x7f0000000580)="586015d890c1754bee4642510a8d79aea9e475a022bdc1add7333a4d258f52a8e82aa3cadc35eab8d17c84997f25a82af4a6bc5c11e51b84eedfddee905814092ab2e82651bd0a6d35024e8e1b237cd6358f44407ef4346130dcef2ee33483aeb889f2a0b4dbbfd932cfd9f9ffe9723e2d7df63936c3d1efa4b0c64dc438b764a7d159c39f327712797a8a8290b7fa0dfec622185532dc143fb899b53f5c0b161d2680d991df015651c57ae257fa27edbb6a48b4", 0xb4}, {&(0x7f0000000640)="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", 0xfd}], 0x9, &(0x7f0000000b00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r1, r3, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r8}}}, @rights={{0x18, 0x1, 0x1, [r0, r9]}}, @rights={{0x24, 0x1, 0x1, [r10, r0, r0, r0, r0]}}], 0x128, 0x4000010}, 0x24004040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)={0xffffffffffffffff, 0xffffffffffffffff}) recvmmsg(r11, &(0x7f0000000c80)=[{{0x0, 0x0, 0x0}}], 0x1, 0x3, 0x0) 00:17:05 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:17:05 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:05 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8", 0x9, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:06 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:06 executing program 2: syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000200)={0x24, &(0x7f0000000080)={0x20, 0x5, 0xc6, {0xc6, 0x23, "0c82e2d9f0e872e557772fa080375d248fda6243bc0c7696a8c033032930e21dc6dd8c4f8b1d7a8cdf8aeae87d8794e2dc3abec1e9f42fefacc4945ed9d3d1c9c054a03a6dc733300ee8386d0bba289e0f6f2134d5ac89862ec1cdfc73fbe5ca8d2508679dedb292f45df9ec952f136f2584ce62ee5bfa246d71927eab8a4233ba3286fec36e27dc613fb6b1810bf1854ee928a766baf33887977ef4a9f1ac91e87e4be05eef87d212ca0a14033f3eac3ade282c362edaddb5481297ea4159c28e6fb381"}}, &(0x7f00000008c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x405}}, &(0x7f0000000880), &(0x7f00000001c0)={0x0, 0x21, 0x9, {0x9, 0x21, 0x9, 0x9, 0x1, {0x22, 0x8ba}}}}, &(0x7f00000003c0)={0x2c, &(0x7f0000000240)={0x40, 0x14, 0x7a, "6c8aa9c300035175d5ed0d159d1d9f511d5169e042ea98e643f7c17339eb82545219bd781dc81cb9d655a79bd4239fb2ed162c5bcce78b5bdc6311143a93775a506b4c1cdfd300858a95f303ce88475ced0a68c059e907d82a8a424afff50947d1b506aaa4fe13625c6a6de37e448b465ff01940fbb973696203"}, &(0x7f00000002c0)={0x0, 0xa, 0x1, 0x7f}, &(0x7f0000000300)={0x0, 0x8, 0x1, 0xf2}, &(0x7f0000000340)={0x20, 0x1, 0x26, "feb85419304d45207c6ff0b39ccaba59032ca39dd724f5a6dff34fd955bb313b2aa96a65ee9b"}, &(0x7f0000000380)={0x20, 0x3, 0x1, 0x2}}) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f0000000580)={0x24, &(0x7f0000000400)={0x40, 0x8, 0x94, {0x94, 0x23, "03f0a975cd606c44292b26eec62a4ad23e989625b3afa6d9a5a1e1c4a3cfa039566cd1f6af19a695b4f50396b9d08469fa4590b4cd74a7d6ca6e524c8c2680f4748a80c018c25bc2756225c488ceb6dc19ea698b028caf3e4d53800bd8c64ceb505b0827c9e3d034f3385936177957f0f19e257bf5e1e44d28579d94ea7ab9849fc763e72030bed32915f9243d9f5dbb5032"}}, &(0x7f00000004c0)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x2400}}, &(0x7f0000000500)={0x0, 0x22, 0x24, {[@local=@item_012={0x2, 0x2, 0x0, "6603"}, @main=@item_4={0x3, 0x0, 0xa, "c72ec6a8"}, @local=@item_4={0x3, 0x2, 0x3, "b6913700"}, @main=@item_012={0x1, 0x0, 0x8, "98"}, @global=@item_012={0x2, 0x1, 0x1, "9ab5"}, @main=@item_4={0x3, 0x0, 0x9, "9b2c0103"}, @main=@item_012={0x1, 0x0, 0x9, '('}, @global=@item_4={0x3, 0x1, 0xb, "40e50f15"}, @global=@item_012={0x0, 0x1, 0x8}, @main=@item_4={0x3, 0x0, 0xb, "52a46eb2"}]}}, &(0x7f0000000540)={0x0, 0x21, 0x9, {0x9, 0x21, 0x3, 0x1, 0x1, {0x22, 0xf6a}}}}, &(0x7f0000000800)={0x2c, &(0x7f00000005c0)={0x40, 0xa, 0xa7, "9bcb4badaaeb728da99d9836feb1eb7041d9e937ba64666c06cb1193d921ee4cc578af0b00dbd1ad7450c5d3a513461b5fa2f1267f04f829bdce941b7ca6ad3690dc8bf6e77f8aa84e2ca91269d787cf21bc67b40472999e1613aee0683561d1f43bb48cb42ec07371de3580083db681c5bf44ff2e156fa0878ff15ffd756929d053d94f14327be387bd3c9b56c5e71e298bfdee240a0d33d9e922dc983e640fa611a101b0d9af"}, &(0x7f0000000680)={0x0, 0xa, 0x1, 0x1}, &(0x7f00000006c0)={0x0, 0x8, 0x1, 0x81}, &(0x7f0000000700)={0x20, 0x1, 0xa2, "d933afd6143ae3cc37dbf7345e4a3bed2bae10d62a0dcd72da41f4e49895d33a6a0e27ecbb6caf8c6d2ac9635899c53f1c5d223f002556dec6db557b97ff20ed448dd05c7193fd785c0603591fefed5229f3f23b0de51589a9cd00c14c909a460d035f1e309a6d00637a8ca40c66e1b9d7bd23f32de55b9d63bba6b4774e561468a2464d9c873098a03f2699ac1fc0654eec0110a77c2090586b8f565517a1793639"}, &(0x7f00000007c0)={0x20, 0x3, 0x1, 0x8}}) syz_usb_control_io$hid(0xffffffffffffffff, &(0x7f00000009c0)={0x24, &(0x7f0000000900)={0x40, 0xc, 0x54, {0x54, 0xc, "7b2c6ad801502aa527304846192696470ca33f66c8a01969bfa5d12c4677fca9e820e4821fa0a0454858c6cd81e517785b78ca44ab375ab4ce456291aa255b36a8252a2438ab72c8ce3b44dd1c00f2afd777"}}, &(0x7f0000000000)={0x0, 0x3, 0x4, @lang_id={0x4, 0x3, 0x41d}}, &(0x7f0000000180)={0x0, 0x22, 0x18, {[@local=@item_4={0x3, 0x2, 0x4, "9e6bd7f2"}, @global=@item_012={0x1, 0x1, 0x9, "c4"}, @global=@item_012={0x0, 0x1, 0x8}, @main=@item_4={0x3, 0x0, 0xb, "868bf637"}, @local=@item_4={0x3, 0x2, 0x1, "38bcfe9d"}, @main=@item_4={0x3, 0x0, 0x9, "f54af7b4"}, @global=@item_012={0x0, 0x1, 0x4}]}}, &(0x7f0000000980)={0x0, 0x21, 0x9, {0x9, 0x21, 0x3, 0x20, 0x1, {0x22, 0x43e}}}}, &(0x7f0000000cc0)={0x2c, &(0x7f0000000a00)={0x40, 0xe, 0x8c, "7fbbc5e08428ddd6fc5de107e79463dd8c287d8ce74fcd0d75d92cf0e2741af4273e8ac565c1ea8b0a5715b1d388f430bff2f68e52aa381249244825b2484bd804002f000c5067b8af293c40020f1d9d8068252cdfaefad0b11acb2b213450a5d6e96e3585df3d3cc54543238244f77e0b23ae4265800504bce84826b53f34d210d448bcb19a13ad609c1765"}, &(0x7f0000000ac0)={0x0, 0xa, 0x1, 0xbb}, &(0x7f0000000b00)={0x0, 0x8, 0x1, 0xff}, &(0x7f0000000b40)={0x20, 0x1, 0xfe, "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"}, &(0x7f0000000c80)={0x20, 0x3, 0x1, 0x1}}) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) syz_emit_vhci(&(0x7f0000000840)=@HCI_EVENT_PKT={0x4, @hci_ev_pscan_rep_mode={{0x20, 0x7}, {@any, 0x1}}}, 0xa) [ 737.345301] No source specified 00:17:06 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) [ 737.699786] No source specified 00:17:16 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:16 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:17:16 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x4, 0x77, 0x5, 0x9, 0x0, 0x400, 0x1000, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x6, 0x4, @perf_config_ext={0x3, 0x6}, 0x4000, 0x9, 0x6a9, 0x2, 0x9, 0x9, 0x100, 0x0, 0xb39, 0x0, 0x7}, 0x0, 0x6, r1, 0x1) 00:17:16 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:16 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:16 executing program 7: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:16 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x78, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000100), 0x240, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xb) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$EXT4_IOC_GROUP_EXTEND(r1, 0x40086607, &(0x7f0000000000)=0x6) 00:17:16 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) r5 = openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) r6 = fork() r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r8, 0x0) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) r10 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000000)="3f9f37a9c21bc3d85f1346df68d14bb6eff9fa9cda49d8977bc50015c3ede60872e88665718e0cc635392ecc8507da39b76bfa1466044a77614bd3c2d280b04e6300cc3b1b04152870dc", 0x4a}, {&(0x7f0000000080)="0f9987eb0c1b263298fda073e0bdae1ee5775d3726e3336ea471e467e4ebb43e30530000000a00000000", 0x2a}, {&(0x7f00000000c0)="96bd8c9bf8ccbe82658938288e355c82917468113931f50bcf4892ff2c68a9c1cbde667ddc249888411795d2f96324519434287f5c59d1e854c84fcafa5707154fdb57e4075df2fc4650fd1da5f36cbb72c171dc8f5b94358800de6902036e8830", 0x61}, {&(0x7f0000000140)="dc069c1e6d738b410ac4f1a9af0e060777d489dc307db3dd70c7590e3bbe323aaffd7471af11aebc799181a985b205afc6576b5c5ba9be9e380f10e6ff4b50a525d64576de78a121c9678e6cd06b9a24ae50dfe1af448acb64ced832d5258c6694289524311808989b1cb3e9089993b5d50578f67834badda23072a309ecbe1e66211f", 0x83}, {&(0x7f0000000200)="accb7ac8ccde16976fbe60a5c5ff0b6dbfff3d76ee408d409bdefa239db8c701d34f512b9a710765964a17bd07e35b206f9043198ac2868b7ac390b5bd3f2feeef0bf58c4d50a36d6712522a83748a11f266c883bdb03fea03f8e4041072997aac3693d151d1b89ff21488c544e36b7e10115d7a7c90f9063b0570819ed84726cc38e578b64bde450282a5d5d347c16eef142dbd0fe4021876ca4bc370096ed6968704213e16c816e216b38adb53cb44b9c1d324800273252d3310798a6aad8274eaf65fd870968eb2cded79e63b92084aa5a4deba0be6a6d2b933d8", 0xdc}, {&(0x7f00000003c0)="fa823948c2649e121ddc455e42e6c76f71b83f415e3776c167add9953ed7c4ac682eb57a7c7a4b3b85b2bf33290f05d289c43330ec56d9a54bd09e8be6ad9f39c3d8b914a37a38b7ef8b6fa1cda44e062a02a08b6d2faf9a7841c8284dcda06a462c8bb776b18763f96b0372af9a34f748bc703bccf96c2a2bd20f93600a6ad1c238d5ff06b4116eae7f8a0c2bae9e4e6d6f823dc133e88f453beae14747a96ca4a69f47bafd0e0461177537668d6d21da25f8a18e39812945c2dfa63e5e145f5641e978510ea4182b97d2241dabc5d1bda190df0b368ef120fbe974a68622a4c9615eb53fe0f3c3e401bc8ea4ae136a8beb77ee64e708c1", 0xf8}, {&(0x7f00000004c0)="d48a9854af1e4a556995876a1aecae4a8ebcb441bfabd8f300a1d09f5d45588b42d2b495d81d2d31d0c307bd29c6177430009b326d6b0667c48a637a968b2bd89579a0ed7d73aa8e9bbf582744406f7eef6ac75ce4c38e3d88edd6505e44551f9736f2d6660fc39dbc3e5637492d2d17cea14445d52423cfbb2919bb732217d2249178b111a413373807ab0f039a", 0x8e}, {&(0x7f0000000580)="586015d890c1754bee4642510a8d79aea9e475a022bdc1add7333a4d258f52a8e82aa3cadc35eab8d17c84997f25a82af4a6bc5c11e51b84eedfddee905814092ab2e82651bd0a6d35024e8e1b237cd6358f44407ef4346130dcef2ee33483aeb889f2a0b4dbbfd932cfd9f9ffe9723e2d7df63936c3d1efa4b0c64dc438b764a7d159c39f327712797a8a8290b7fa0dfec622185532dc143fb899b53f5c0b161d2680d991df015651c57ae257fa27edbb6a48b4", 0xb4}, {&(0x7f0000000640)="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", 0xfd}], 0x9, &(0x7f0000000b00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r1, r3, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r8}}}, @rights={{0x18, 0x1, 0x1, [r0, r9]}}, @rights={{0x24, 0x1, 0x1, [r10, r0, r0, r0, r0]}}], 0x128, 0x4000010}, 0x24004040) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000001000)) [ 747.722845] No source specified 00:17:16 executing program 7: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) [ 747.865088] Bluetooth: hci0: Opcode 0x0c1a failed: -4 [ 747.874892] Bluetooth: hci0: Opcode 0x0406 failed: -4 [ 747.905015] Bluetooth: hci1: Opcode 0x0c1a failed: -4 [ 747.911201] Bluetooth: hci1: Opcode 0x0406 failed: -4 [ 747.925058] Bluetooth: hci2: Opcode 0x0c1a failed: -4 [ 747.929782] Bluetooth: hci2: Opcode 0x0406 failed: -4 [ 747.943618] Bluetooth: hci3: Opcode 0x0c1a failed: -4 [ 747.945413] Bluetooth: hci3: Opcode 0x0406 failed: -4 [ 747.965491] Bluetooth: hci5: Opcode 0x0c1a failed: -4 [ 747.976668] Bluetooth: hci5: Opcode 0x0406 failed: -4 [ 747.998350] Bluetooth: hci7: Opcode 0x0c1a failed: -4 [ 748.003843] Bluetooth: hci7: Opcode 0x0406 failed: -4 [ 748.015976] Bluetooth: hci4: Opcode 0x0c1a failed: -4 [ 748.020646] Bluetooth: hci4: Opcode 0x0406 failed: -4 [ 748.033045] No source specified 00:17:16 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:16 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYRESDEC], 0x7) syz_emit_vhci(&(0x7f0000000040)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x8}, "2f76b013b08d6679"}, 0xc) 00:17:16 executing program 7: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:16 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r0, @ANYBLOB='./file0\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(r1, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:17:16 executing program 4: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:17:16 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff", 0xb, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) [ 748.264483] No source specified [ 749.693425] Bluetooth: hci0: command 0x0406 tx timeout [ 749.948636] Bluetooth: hci3: command 0x0406 tx timeout [ 749.949571] Bluetooth: hci2: command 0x0406 tx timeout [ 749.950369] Bluetooth: hci1: command 0x0406 tx timeout [ 750.012670] Bluetooth: hci7: command 0x0406 tx timeout [ 750.012717] Bluetooth: hci5: command 0x0406 tx timeout [ 750.076643] Bluetooth: hci4: command 0x0406 tx timeout [ 751.740704] Bluetooth: hci0: command 0x0406 tx timeout [ 751.996656] Bluetooth: hci1: command 0x0406 tx timeout [ 751.996711] Bluetooth: hci2: command 0x0406 tx timeout [ 751.997713] Bluetooth: hci3: command 0x0406 tx timeout [ 752.060668] Bluetooth: hci5: command 0x0406 tx timeout [ 752.060700] Bluetooth: hci7: command 0x0406 tx timeout [ 752.124649] Bluetooth: hci4: command 0x0406 tx timeout 00:17:29 executing program 3: syz_emit_ethernet(0x134, &(0x7f00000001c0)={@random="6cc703ac1514", @empty, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "0100", 0xfe, 0x3a, 0x0, @empty, @initdev={0xfe, 0x88, '\x00', 0x1, 0x0}, {[], @echo_request={0x80, 0x0, 0x0, 0x0, 0x0, "ae6987e26108fb18064b4a31e523328e3f682d6cf8b2d18542df8b3b75ef31766f60c4950ea00eead97c7a320c1746f43fc776dd3d2d382e3dea283b60579230b85d6e211aaaebd2c5bd5d187af87ba007ee636cdc682f3e7ffea81b211dbc8b738f37499c486ea7aa0e5ac0c2d03ba03ba380fac52726dfd06145b91c13f5986a05260362de34b1d3fe6668018afba3c2ddcc72842c1f26488f06de761da4cb0266a1178f1a94e168769006fa1aa31b2657eda8a6a428cd5e6b0bd8a0bd1833bf645b2c8c0ef622a60ae21736877d072beba637e272915b9e5cb378c9e990e5ffe16e5851aba823cc12603b1c4687558acb961806d2"}}}}}}, 0x0) syz_emit_ethernet(0x19, &(0x7f0000000040)={@random="7df19ace9b7b", @random="3643f8e8161c", @void, {@x25={0x805, {0x0, 0x7, 0x1b, "73400b36f2fa42f4"}}}}, 0x0) pipe(&(0x7f0000000080)={0xffffffffffffffff}) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000180)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x18}, 0xc, &(0x7f0000000140)={&(0x7f0000000100)={0x24, 0x3, 0x1, 0x3, 0x0, 0x0, {0x7, 0x0, 0x9}, [@CTA_PROTOINFO={0x10, 0x4, 0x0, 0x1, @CTA_PROTOINFO_DCCP={0xc, 0x2, 0x0, 0x1, [@CTA_PROTOINFO_DCCP_ROLE={0x5, 0x2, 0x13}]}}]}, 0x24}, 0x1, 0x0, 0x0, 0x44814}, 0xc5) 00:17:29 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:29 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xe, 0xffffffffffffffff, 0xb) perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0x76, 0x7, 0x0, 0x4, 0x0, 0x1, 0x44200, 0x8, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x10000, 0x0, @perf_config_ext={0x6, 0x6}, 0xe0, 0x9, 0x84, 0x5, 0x5, 0x0, 0x7b5, 0x0, 0x0, 0x0, 0x7fffffff}, 0x0, 0x7, r0, 0x3) 00:17:29 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:29 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) r5 = openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) r6 = fork() r7 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r7, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r8, 0x0) r9 = accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) r10 = openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) sendmsg$unix(0xffffffffffffffff, &(0x7f0000000c40)={0x0, 0x0, &(0x7f0000000740)=[{&(0x7f0000000000)="3f9f37a9c21bc3d85f1346df68d14bb6eff9fa9cda49d8977bc50015c3ede60872e88665718e0cc635392ecc8507da39b76bfa1466044a77614bd3c2d280b04e6300cc3b1b04152870dc", 0x4a}, {&(0x7f0000000080)="0f9987eb0c1b263298fda073e0bdae1ee5775d3726e3336ea471e467e4ebb43e30530000000a00000000", 0x2a}, {&(0x7f00000000c0)="96bd8c9bf8ccbe82658938288e355c82917468113931f50bcf4892ff2c68a9c1cbde667ddc249888411795d2f96324519434287f5c59d1e854c84fcafa5707154fdb57e4075df2fc4650fd1da5f36cbb72c171dc8f5b94358800de6902036e8830", 0x61}, {&(0x7f0000000140)="dc069c1e6d738b410ac4f1a9af0e060777d489dc307db3dd70c7590e3bbe323aaffd7471af11aebc799181a985b205afc6576b5c5ba9be9e380f10e6ff4b50a525d64576de78a121c9678e6cd06b9a24ae50dfe1af448acb64ced832d5258c6694289524311808989b1cb3e9089993b5d50578f67834badda23072a309ecbe1e66211f", 0x83}, {&(0x7f0000000200)="accb7ac8ccde16976fbe60a5c5ff0b6dbfff3d76ee408d409bdefa239db8c701d34f512b9a710765964a17bd07e35b206f9043198ac2868b7ac390b5bd3f2feeef0bf58c4d50a36d6712522a83748a11f266c883bdb03fea03f8e4041072997aac3693d151d1b89ff21488c544e36b7e10115d7a7c90f9063b0570819ed84726cc38e578b64bde450282a5d5d347c16eef142dbd0fe4021876ca4bc370096ed6968704213e16c816e216b38adb53cb44b9c1d324800273252d3310798a6aad8274eaf65fd870968eb2cded79e63b92084aa5a4deba0be6a6d2b933d8", 0xdc}, {&(0x7f00000003c0)="fa823948c2649e121ddc455e42e6c76f71b83f415e3776c167add9953ed7c4ac682eb57a7c7a4b3b85b2bf33290f05d289c43330ec56d9a54bd09e8be6ad9f39c3d8b914a37a38b7ef8b6fa1cda44e062a02a08b6d2faf9a7841c8284dcda06a462c8bb776b18763f96b0372af9a34f748bc703bccf96c2a2bd20f93600a6ad1c238d5ff06b4116eae7f8a0c2bae9e4e6d6f823dc133e88f453beae14747a96ca4a69f47bafd0e0461177537668d6d21da25f8a18e39812945c2dfa63e5e145f5641e978510ea4182b97d2241dabc5d1bda190df0b368ef120fbe974a68622a4c9615eb53fe0f3c3e401bc8ea4ae136a8beb77ee64e708c1", 0xf8}, {&(0x7f00000004c0)="d48a9854af1e4a556995876a1aecae4a8ebcb441bfabd8f300a1d09f5d45588b42d2b495d81d2d31d0c307bd29c6177430009b326d6b0667c48a637a968b2bd89579a0ed7d73aa8e9bbf582744406f7eef6ac75ce4c38e3d88edd6505e44551f9736f2d6660fc39dbc3e5637492d2d17cea14445d52423cfbb2919bb732217d2249178b111a413373807ab0f039a", 0x8e}, {&(0x7f0000000580)="586015d890c1754bee4642510a8d79aea9e475a022bdc1add7333a4d258f52a8e82aa3cadc35eab8d17c84997f25a82af4a6bc5c11e51b84eedfddee905814092ab2e82651bd0a6d35024e8e1b237cd6358f44407ef4346130dcef2ee33483aeb889f2a0b4dbbfd932cfd9f9ffe9723e2d7df63936c3d1efa4b0c64dc438b764a7d159c39f327712797a8a8290b7fa0dfec622185532dc143fb899b53f5c0b161d2680d991df015651c57ae257fa27edbb6a48b4", 0xb4}, {&(0x7f0000000640)="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", 0xfd}], 0x9, &(0x7f0000000b00)=[@rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, r0, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, r0, r0, r0]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0x0, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, 0xee01, 0xffffffffffffffff}}}, @rights={{0x30, 0x1, 0x1, [r0, 0xffffffffffffffff, r0, r1, r3, r0, r4, r5]}}, @cred={{0x1c, 0x1, 0x2, {r6, 0xee00, r8}}}, @rights={{0x18, 0x1, 0x1, [r0, r9]}}, @rights={{0x24, 0x1, 0x1, [r10, r0, r0, r0, r0]}}], 0x128, 0x4000010}, 0x24004040) 00:17:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:29 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:29 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r0, @ANYBLOB='./file0\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(r1, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) [ 761.271848] No source specified 00:17:30 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) process_vm_writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) r2 = fork() r3 = fork() r4 = getpid() setpgid(r3, r4) r5 = gettid() r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r6, &(0x7f0000001200)=""/135, 0x87, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) kcmp(r2, r2, 0x0, r0, 0xffffffffffffffff) pread64(r6, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r5, 0x8, r6, 0x4) sendmsg$AUDIT_TTY_SET(r6, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r7 = open$dir(&(0x7f0000000040)='./file0\x00', 0x2000, 0x80) kcmp(r4, r1, 0x5, r6, r7) sched_getaffinity(r1, 0x8, &(0x7f0000000300)) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYRES16=r1], 0x7) 00:17:30 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) [ 761.561058] No source specified 00:17:30 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0x0) perf_event_open(&(0x7f0000001180)={0x0, 0x80, 0x4, 0x2, 0x1, 0x80, 0x0, 0x80000000, 0x4008, 0x4, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f00000000c0), 0x8}, 0x12428, 0x0, 0x3, 0x3, 0x7, 0x9, 0x0, 0x0, 0x1, 0x0, 0x9}, r0, 0x5, 0xffffffffffffffff, 0x9) process_vm_writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000300)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x6, 0x3f, 0x74, 0x6, 0x0, 0x2, 0x100, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x2, @perf_config_ext={0xfffffffffffffffc, 0x7fffffff}, 0x40108, 0x1, 0x2, 0x8, 0x1, 0x9, 0x5, 0x0, 0x0, 0x0, 0xffffffffffff0000}, r0, 0xe, 0xffffffffffffffff, 0x18) r1 = fork() r2 = fork() kcmp(r1, r2, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r3 = getpid() setpgid(r2, r3) perf_event_open(&(0x7f0000001240)={0x1, 0x80, 0x20, 0x0, 0x9, 0x40, 0x0, 0x2, 0x4000, 0x5, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8, 0x1, @perf_bp={&(0x7f0000001200), 0x9}, 0x0, 0x3, 0xfce, 0x9, 0x7fffffff, 0x200, 0xec6d, 0x0, 0x0, 0x0, 0x100}, r2, 0x6, 0xffffffffffffffff, 0x1) syz_emit_ethernet(0x2a, &(0x7f0000001100)=ANY=[@ANYBLOB="0180c2000000aaaaaab602000000000000ecffffffab141400000000e60ffa20600000000036ccacea3e232b447e25ff29274b2edaba29beadde233d4cba7a925f84aadc58773b3adb0655d9f5205fccfefe19f83c"], 0x0) 00:17:30 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:30 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r0, @ANYBLOB='./file0\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(r1, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:17:30 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) fork() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r4, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) openat$cgroup_netprio_ifpriomap(0xffffffffffffffff, &(0x7f0000000ac0), 0x2, 0x0) [ 761.787128] No source specified 00:17:30 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:30 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:30 executing program 4: io_setup(0x5, &(0x7f0000000100)=0x0) io_pgetevents(r0, 0x1, 0x1, &(0x7f0000000140)=[{}], 0x0, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) io_submit(r0, 0x1, &(0x7f0000000500)=[&(0x7f0000000400)={0x0, 0x0, 0x0, 0x0, 0x0, r1, 0x0}]) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000300)='./binderfs2/binder-control\x00', 0x800, 0x0) r4 = openat$zero(0xffffffffffffff9c, &(0x7f0000000540), 0x80, 0x0) r5 = accept$inet6(0xffffffffffffffff, &(0x7f00000005c0)={0xa, 0x0, 0x0, @dev}, &(0x7f0000000600)=0x1c) r6 = gettid() r7 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r7, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r7, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r6, 0x8, r7, 0x4) sendmsg$AUDIT_TTY_SET(r7, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000980)={{0x1, 0x1, 0x18, r1, {0x6}}, './file0\x00'}) io_submit(0x0, 0x7, &(0x7f0000000a00)=[&(0x7f0000000180)={0x0, 0x0, 0x0, 0x6, 0x7, 0xffffffffffffffff, &(0x7f0000000040)="40045cea681a89ef17c4a7394996937e2df97b6c53ce8c67e973b5f115c51e39e1cd34a5fdf56ee0ff75dd7630f0ffc9b6ee407e4441058af08ca25b6ccb4e7dee3ec170b0677b78fd72ebd47dad9844e53942fefee33dc25bfc3a16ae5b2a45749f2ff361fa84737ac07085b756d26e1249dcbadd1f72103d8d6ea7d4255e3b5aa739d31706c295", 0x88, 0x1f, 0x0, 0x2}, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x7, 0xffffffffffffffff, &(0x7f00000001c0)="e7238b21d88da48eced5092feb67be0fb9d7d2c93d113f1aa63691296f2c66f0eb3ca4e95f8d230a14df802e92174d6fb6ce6d253039e3294634ec58be2dbda1c40eac0c4b09d04a236d9e98808b767b545a7dc609ef4ffffbf8b7056adca76eedb359cdac3b461a1b2f6edc1bf3608dab1557c823d41dd7b85ed5f6712f406dd44712bb7188bf0b8696722fc2bc94c7c88a873da6b88f4fb84589db8921d1704081708282a8b6dc3ae80b906ae47ec3f2de8c4f44fdb8a45f961f2f1f0800af4da783d015de10e17bf8d5a9842b2c8dd893ac8db2", 0xd5, 0x5, 0x0, 0x4, r2}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x7fff, r3, &(0x7f0000000340)="55229160978694d94445a68dd46fbebd57fd2e1cb2d2bf53662d07d10c11ee5e496caaac281b6de20660bba13fd9799be4d9ba39317ce13a84a943f1d7caaa029d5d8fb7c5c8821887f437297388ba3daa6df2a9ce8ee78bafce9c7f840e0929da137063d621118f8c43b76854c3d48d249c", 0x72, 0xffff, 0x0, 0x1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x2, 0x0, r1, &(0x7f0000000440)="19218ea076195993a2b31a2c5f2b1b826e508c55e8672d7c53c970f7c457570251a8e5156366f2e6d2f8d82224ac465d0f1c036cdc3d008dd3815f10ccb263ce3f37c3bc586766d7947265cfb91623efb1e81624a8cb6f5c3bba89109c33802c1d5f7e9bc7131cd50271cf33cc9a79fdd86e9b20e93d4fd6e7612403c3079fb74200600d9e91e8eb337f64916eaed7cbd0246fa94254e97a43cce280c41247ad7570ac2539aa762bfa0d8906302902ce", 0xb0, 0x7, 0x0, 0x0, r4}, &(0x7f0000000740)={0x0, 0x0, 0x0, 0x2, 0x2, r5, &(0x7f0000000640)="efbffd6dea76d7f1d70839b78227bc1d34d554d603136cc685703f4f7765ec641a5499b122c79c6f5d01d261d1bd0d116bd6f708326e66c60d3931ee598e4f6ecec9fc400672de42f3b04d43270fdfe17fa97ed677e4c922a31072995c5bdc2a0b4b36d378a3e2f71fa34973d931dcecff1e886f3fc86310369ebe98bc674a3d535e2bf392d58c02b91de78fcadc5ef8cf157e3e7898a2af00ce2256809b2233cd956d5ba9aa08fc3ee4a2d1c0c7b01952dec7bcd6102123bf3780c65d7154b841dd07ce548fde339046f01ca198b649", 0xd0, 0x8}, &(0x7f0000000880)={0x0, 0x0, 0x0, 0x3, 0xfffb, r7, &(0x7f0000000780)="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", 0xfe, 0x9, 0x0, 0x3}, &(0x7f00000009c0)={0x0, 0x0, 0x0, 0x5, 0x98, r1, &(0x7f00000008c0)="3cd4e5b9675de696a31ea7185b7fa01781caf567bcdc47002eeee6f0a7305cc0e502aaef72c482c00040e381b3b4f7390a557529e46a09ca864c295818eb13aefe1db163f449939f71f9db0b539f42516dcebd5668bedc60ed4e659b9f3b0db9bb39e43c547300b710e096af0371c4369e2bfe7ea9c270ef56a5177dee31082cf545e75703d6fc17d5b8c466a9db67c97c", 0x91, 0x1, 0x0, 0x1, r8}]) [ 762.054279] No source specified 00:17:42 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r0, 0x8904, &(0x7f0000000100)=0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x8, 0xff, 0x1, 0x40, 0x0, 0x40, 0x80008, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x72, 0x4, @perf_bp={&(0x7f0000000000), 0x1}, 0x1108d, 0x200, 0x8, 0x2, 0x3, 0x2, 0x8001, 0x0, 0x4, 0x0, 0x435}, r1, 0x4, r0, 0x1) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="08000409401620bf330f0766bdae00499d4f955f7480786f73abe67d15"], 0x7) 00:17:42 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) fork() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r4, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) 00:17:42 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={0x0, 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:42 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:42 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x0, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:42 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000008600)) setregid(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(r1, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:17:42 executing program 4: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x0) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)={0xd4, 0x5a, 0x1, 0x0, 0x0, "", [@generic="b212a87179a2a950d12f8d95f01d28c2f835f6dad3517aeb21afc1dd172ea6a9a5211c336a76cc1130daef318534fb46be2ad6616aff07964ab5251b0cd15e627b8fa94a91ac31a9f60b762f4a084cd7c763b1126f29453fc34ad3fca72ec801f6be4d33e4932160c7ac942dfda5878ece14503d1ae4ee38d068110f5a775d12b2b5f08360c4871a11c147ef2eb34dc1cb1ffec641cf5b566772c71ca9a43c5bab6e15633fd49ba097ae9abc6245e8eb8b9a1a594c8da0c32551039a007a846aa6cc9709"]}, 0xd4}], 0x1, 0x0, 0x0, 0x8000}, 0x0) pwritev2(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="9102059e4a6444be0b79d3372ca656e53e8353de84ddcda126a075b0c4e3749790ff6772aadac232dac1f497f46c02f4c2322973ff85ac1a7f73869cd146fc4df290e40af6a0a4a2aca29301927c0d1d99120627f154f4d3276661b79f8f3e31c821bf0b2633f07eaa9e98710d9f20d81642345961fcda89f8e6b6ef4e9a5394cf32c5e2fdf6c851ee750a13a2eff0b79a47364eaefe3fad245e6de8f2bb4ddf5df021cefd5afcfa02df857704fadf1e418082136788", 0xb6}, {&(0x7f00000003c0)="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", 0x1000}, {&(0x7f00000013c0)="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", 0x1000}], 0x3, 0x42a, 0x5, 0x3) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) sendmsg$FOU_CMD_GET(r2, &(0x7f00000002c0)={&(0x7f0000000040), 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x0, 0x400, 0x70bd27, 0x25dfdbfe, {}, [@FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x18}, 0x1, 0x0, 0x0, 0x60008895}, 0x1) 00:17:42 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) [ 774.317768] netlink: 192 bytes leftover after parsing attributes in process `syz-executor.4'. [ 774.341208] No source specified 00:17:43 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:55 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:55 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={0x0, 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:55 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={0x0, 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:55 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) fork() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r4, 0x0) accept4$bt_l2cap(0xffffffffffffffff, &(0x7f0000000a40)={0x1f, 0x0, @fixed}, &(0x7f0000000a80)=0xe, 0xc0000) 00:17:55 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:55 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:55 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000008600)) setregid(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(r1, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:17:55 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f040909c3ea"], 0x7) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x6, 0x7, 0x43, 0x8a, 0x0, 0x80000001, 0x14, 0x4, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x2, @perf_bp, 0x5a94, 0x10000, 0x0, 0x0, 0xc7a, 0x8000, 0x1, 0x0, 0x6, 0x0, 0x9}, 0xffffffffffffffff, 0xffffffffffffffff, r0, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000240)) sendmsg$nl_generic(r2, &(0x7f0000000840)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000800)={&(0x7f0000000880)={0x14, 0x34, 0x200, 0x70bd2a, 0x25dfdbfd}, 0x14}, 0x1, 0x0, 0x0, 0x40881}, 0xc084) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) pread64(r4, &(0x7f00000001c0)=""/17, 0x11, 0x50) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x7, 0xbb, 0x7d, 0x7, 0x0, 0x6, 0x59010, 0xa, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0xb5b, 0x4, @perf_bp={&(0x7f0000000100), 0x1}, 0x2002, 0x322, 0xffffffff, 0x5, 0x7, 0xff, 0x800, 0x0, 0x9, 0x0, 0x6e}, 0x0, 0x9, r2, 0x9) 00:17:55 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000001080)={0x4, 0x80, 0x6, 0x0, 0x8, 0x20, 0x0, 0x4, 0x80051, 0x8, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x101, 0x2, @perf_config_ext={0x4468, 0x3}, 0x3, 0x1, 0x9eca, 0x5, 0x822, 0x80000001, 0x8000, 0x0, 0x8, 0x0, 0x7f}, r1, 0x8, r0, 0x8) ioctl$BTRFS_IOC_RM_DEV(r0, 0x5000940b, &(0x7f0000000080)={{r0}, "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"}) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:17:55 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:55 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:55 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) fork() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r4, 0x0) 00:17:55 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:55 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f00000000c0)=ANY=[@ANYBLOB="040f04094016201524f9637683adb547034d6dd0cd85bd6d0b39ad62bded1a56703746c2693bfad3aa81a52c496ced6dedd21c71c89661a9cf0abe99132d806fc0601dcaea5f81a53765aa13367f773d845e06"], 0x7) 00:17:55 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:55 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:55 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={0x0, 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:17:55 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:55 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:17:55 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, 0x0, &(0x7f0000008600)) setregid(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) r1 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(r1, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:17:55 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000080)=ANY=[@ANYBLOB="040f0409d8d8e26b26b2a6bc609e47401620"], 0x7) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = socket$inet_udp(0x2, 0x2, 0x0) fcntl$dupfd(r1, 0x0, r2) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_sync_train_complete={{0x4f, 0x1}, {0x9}}}, 0x4) 00:17:55 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:17:55 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) fork() r3 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r3, 0x1, 0x11, &(0x7f00000085c0), &(0x7f0000008600)=0xc) 00:17:56 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(0x0, &(0x7f00000000c0)=""/31) 00:17:56 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(0x0, &(0x7f00000000c0)=""/31) 00:17:56 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) fchdir(0xffffffffffffffff) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x5a, 0x2, 0x9, 0x8, 0x0, 0xff, 0x9a04, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x100, 0x400}, 0x1044, 0xffffffffffffff99, 0x3, 0x3, 0xfffffffffffffffe, 0x1ff, 0x0, 0x0, 0x1df, 0x0, 0x26}, r1, 0xc, r4, 0x9) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) setsockopt$inet6_tcp_int(r2, 0x6, 0x3, &(0x7f0000000200)=0x9, 0x4) sendmmsg$inet6(r0, &(0x7f0000006840)=[{{&(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @local}}, 0x1c, 0x0}}], 0x1, 0x24044054) r5 = accept$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000080)=0x1c) getsockname(r5, &(0x7f0000000180)=@l2tp={0x2, 0x0, @empty}, &(0x7f00000000c0)=0x80) 00:17:56 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) fork() socket$nl_xfrm(0x10, 0x3, 0x6) 00:18:06 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080)}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:06 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:06 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(0x0, &(0x7f00000000c0)=""/31) 00:18:06 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:06 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, 0x0) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:18:06 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000280)={0x8201800, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2a}, &(0x7f0000000100)=""/165, 0xa5, &(0x7f00000001c0)=""/115, &(0x7f0000000240)=[0x0], 0x1}, 0x58) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYRESOCT=r0], 0x7) 00:18:06 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) fork() 00:18:06 executing program 3: ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f0000000040)) r0 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000900100000f000000000000000200000006000000000008000080000020000000e2f4655fe2f4655f0100ffff53ef010001000000e1f4655f000000000000000001000000000000000b0000000004000008000000d2", 0x61, 0x400}, {0x0, 0x0, 0x1000}], 0x0, &(0x7f0000014a00)) ioctl$LOOP_SET_FD(0xffffffffffffffff, 0x4c00, r0) 00:18:06 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f04f13f1620"], 0x7) 00:18:06 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', 0x0) 00:18:16 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:16 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080)}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:16 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:16 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x1, &(0x7f0000000200)=[{&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:16 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', 0x0) 00:18:16 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) write$binfmt_script(r2, &(0x7f00000000c0)={'#! ', './file0', [{}, {0x20, '$-\'{-#{'}, {0x20, '-'}, {}], 0xa, "f0ba0b3ead5e4d8d2d1656b60cefa57482b57003e1d38ddda53a9c356ba69d6c57a81d6812fa4600566316a165af33676cfa86072f87d95a1dc24a2c9de50d87df12e8b1594ac23f7f847baf34d2970b4a32491a625ee07a28f793aaff6ac310142e5c"}, 0x7a) perf_event_open(&(0x7f0000000040)={0x2, 0x80, 0x8d, 0x8, 0x0, 0x1c, 0x0, 0x5, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7, 0x0, @perf_bp, 0x40200, 0x200, 0x5, 0x2, 0x57d, 0x2000400, 0xa000, 0x0, 0x15, 0x0, 0x5}, 0xffffffffffffffff, 0x8, r0, 0x1) 00:18:16 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) openat2(0xffffffffffffff9c, &(0x7f00000009c0)='./file0\x00', &(0x7f0000000a00)={0x4e0800, 0x40, 0x8}, 0x18) 00:18:16 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, 0x0) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:18:16 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', 0x0) 00:18:16 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) perf_event_open(&(0x7f0000001780)={0x4, 0x80, 0x0, 0x1, 0x40, 0x3, 0x0, 0x9, 0x110, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000500), 0x8}, 0x4, 0x8, 0x10001, 0x3, 0x8, 0x8, 0x8, 0x0, 0x6, 0x0, 0xfffe000000000000}, r1, 0x6, r0, 0x1) read(r0, &(0x7f0000000780)=""/4096, 0x1000) r3 = syz_mount_image$msdos(&(0x7f0000000000), &(0x7f0000000080)='./file0\x00', 0x0, 0x8, &(0x7f0000000640)=[{&(0x7f00000000c0)="0e0cda0a6fc7c5471b27a61f4b266331d6f4c2c26ead550961a242a3deeb73536680c959d34a3e7fa0428583f1da709fbd3cb115ca23462159436610276dc4818a65db96889eb6ab4d1177000e9c4dd5975dc3ed9a8b6116db077703abd59474e76f33d7ceea054c015bbaf61dae3c460ab51a0983d52d4b5e5667c3e7f85bd5a750191753214c6a987ab5a6376d181a1a8383a3c98d09e5b753f0ad8ec41b970bf90df9b4b9223b2afda4f6b0716634aa946243df357d610d49c5dbe26c9d56b7af1c571d009db507c4596f179031a568f50d919afee89400d60d789b2c", 0xde, 0xd89f}, {&(0x7f00000001c0)="dae371b8717637a34dba138941a27268e7a2a6007a8dd3ece6023aca61c515999a24ddba520613c8ec5b761612132367ae2775897cea3a500c5a78abf5c1386dbb700b997b62f218fbfe375bdb3ab34c6debd844f55668adf1cc", 0x5a, 0x7}, {&(0x7f0000000240)="9930205dcd1fb576813b4ea8e2e07415ca2e5c8b8cfb392316c559c526ead01d3d4d0fd90f8bd77a25d8d001979dcf6c559a05b4fcda18931212a53137297dd0d10f1f402b2272a9db800874abedebc81bf3e08fdfc43dfa52e887a0e8208fc6ffce87062f2f43ec53d1803b36e8a9f77588b352006c43de2cd64d4326386d4bf623286f99b3ac6ebb0bfc928352250aa52dfcf4366b419d61b32f065690b269e907be9b83396716ec3cac2d7839c061096b4b128f3981cfeaa0201121b45a1a41ec6940fa124f9b1bd5d1d6acf75fb4fd83be347afda672ebc539272642805618dd5637f5902297045298713d450a41c5c5bddc", 0xf4, 0x1000}, {&(0x7f0000000340)="9a2eccb950974326d01c4248cb5c6df66a63ee870a95583cdb2b9080f00213effe081a351654c0bd63f0fce68572aece888c13c11b38822d760ca0d4f8230e8138df54f046747654ba16caa9dd35eb52906de3e0f97de3c1b5874e40631fbe20f9ff63c929902d65762201e7ed74e8b7c42706caaaa31c7a169e76c421bc8587384464ed9236f099", 0x88, 0xe588}, {&(0x7f0000000400)="0fde1c84444004c6850f2c48fd1bccdbb0dd9a150f51eec5412b4039ec0de3a21777cbd9338f337510a1f5ce69a3376558b9dcb14639cde412cad59e722efe20f523580696b1c26bf239d66e8bb3bcb8231514efd9e2f3b30486c321bb27188eceb30a2c886a17af10ca5ed6aa981fedb37e3733139beff384c5e8fa5df182d173bacb241612b61f7c122c2182900588cc425c9c6c04c887069702153756ac3090bf923ffb0d704a75917b34e63c43fd1f5a979b7546720bd72fd35ec2cda6cb2d343ccade01ace273489ed9272385071300564a", 0xd4, 0x8}, {&(0x7f0000000500), 0x0, 0xd3}, {&(0x7f0000000540)="289e9a39c640b29ad388e16553d984b3a85191c44f9423542256a599", 0x1c, 0x8}, {&(0x7f0000000580)="34708de1e2a50b5460e32e1e47a6b7eadf468d83d735e9e4e7ce906c79d94c4b41aec8cc29597cd4e2709e7dfb09767c864690dc2cb7129aaced0c0cdc1e8a17f9ba600dfbd7e07af5431e93f2ba431f7d76efcc59c0b0be61e5200a4a5b1b805567348d19b16d9001968c4e8d66ef8104ebbdf7d70f6bfa2858ff90c66c956ada93a4d60aaeb80bc3bddcfac53766aed2f44ee8d819e144020b8a76d6", 0x9d, 0x6}], 0xa0000, &(0x7f0000000700)={[{@nodots}, {@nodots}, {@nodots}], [{@func={'func', 0x3d, 'FILE_MMAP'}}, {@appraise_type}]}) epoll_ctl$EPOLL_CTL_ADD(0xffffffffffffffff, 0x1, r3, &(0x7f0000000740)={0x20000009}) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="04a98e09008000"], 0x7) 00:18:16 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) 00:18:16 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', 0x0) 00:18:16 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:16 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080)}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:16 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080)}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:27 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:27 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) (fail_nth: 1) 00:18:27 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:27 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{0x0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:27 executing program 1: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open$cgroup(&(0x7f0000000940)={0x0, 0x80, 0x7f, 0xc0, 0x9, 0x0, 0x0, 0x3ff, 0x1000, 0xa, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x200, 0x0, @perf_bp={&(0x7f0000000900), 0x3}, 0x40020, 0x8, 0x2, 0x6, 0xea3, 0x3, 0x7, 0x0, 0x780c, 0x0, 0x7f}, 0xffffffffffffffff, 0xf, r0, 0x5) 00:18:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={0x0, 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:27 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, 0x0) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:18:27 executing program 2: recvmsg$unix(0xffffffffffffffff, &(0x7f00000008c0)={&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000680)=[{&(0x7f0000000180)=""/130, 0x82}, {&(0x7f0000000240)=""/79, 0x4f}, {&(0x7f00000002c0)=""/79, 0x4f}, {&(0x7f0000000340)=""/53, 0x35}, {&(0x7f0000000380)=""/89, 0x59}, {&(0x7f0000000400)=""/160, 0xa0}, {&(0x7f00000004c0)=""/114, 0x72}, {&(0x7f0000000540)=""/112, 0x70}, {&(0x7f00000005c0)=""/142, 0x8e}], 0x9, &(0x7f0000000740)=ANY=[@ANYBLOB="34000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYRES32, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000002b2d16286b97de77170100000000000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000024000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYBLOB="000000001c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000028000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32], 0x170}, 0x2) r2 = getpgrp(r1) r3 = perf_event_open(0x0, r2, 0x20000000100026, 0xffffffffffffffff, 0xa) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000080)={{0x1, 0x1, 0x18, r3, {r3}}, './file0\x00'}) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f00000000c0)=0x200000) mmap(&(0x7f0000ffb000/0x2000)=nil, 0x2000, 0x2000006, 0x2010, r4, 0x3b58b000) r5 = signalfd(r0, &(0x7f0000000980)={[0x3f]}, 0x8) perf_event_open(&(0x7f0000000900)={0x5, 0x80, 0x7, 0x2, 0x6, 0x9, 0x0, 0xfffffffffffffff9, 0x21000, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fff, 0x7, @perf_bp={&(0x7f0000000040), 0x4}, 0xc, 0xff, 0x4, 0x3, 0x3, 0x7, 0x8, 0x0, 0x7, 0x0, 0x9}, 0xffffffffffffffff, 0x5, r5, 0x2) syz_emit_vhci(&(0x7f0000000040)=ANY=[], 0x7) syz_emit_vhci(&(0x7f0000000000)=@HCI_VENDOR_PKT={0xff, 0x1}, 0x2) 00:18:27 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) [ 818.537432] FAULT_INJECTION: forcing a failure. [ 818.537432] name failslab, interval 1, probability 0, space 0, times 1 [ 818.538376] CPU: 0 UID: 0 PID: 40162 Comm: syz-executor.7 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 818.538392] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 818.538399] Call Trace: [ 818.538404] [ 818.538409] dump_stack_lvl+0xfa/0x120 [ 818.538428] should_fail_ex+0x4d7/0x5e0 [ 818.538445] ? getname_flags.part.0+0x48/0x540 [ 818.538464] should_failslab+0xc2/0x120 [ 818.538482] kmem_cache_alloc_noprof+0x80/0x690 [ 818.538501] ? get_pid_task+0x29/0x250 [ 818.538525] ? getname_flags.part.0+0x48/0x540 [ 818.538542] getname_flags.part.0+0x48/0x540 [ 818.538562] getname_flags+0x95/0xe0 [ 818.538576] user_path_at+0x27/0x90 [ 818.538590] user_statfs+0x86/0x170 [ 818.538609] ? __pfx_user_statfs+0x10/0x10 [ 818.538625] ? find_held_lock+0x2b/0x80 [ 818.538638] ? ksys_write+0x187/0x240 [ 818.538653] ? lock_release+0xc8/0x290 [ 818.538672] __do_sys_statfs+0x8a/0x150 [ 818.538689] ? __pfx___do_sys_statfs+0x10/0x10 [ 818.538706] ? perf_trace_run_bpf_submit+0xef/0x180 [ 818.538721] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 818.538735] ? perf_trace_run_bpf_submit+0xef/0x180 [ 818.538751] ? perf_trace_preemptirq_template+0x259/0x430 [ 818.538771] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 818.538786] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 818.538804] ? __pfx_ksys_write+0x10/0x10 [ 818.538821] ? do_syscall_64+0x85/0x390 [ 818.538837] do_syscall_64+0xbf/0x390 [ 818.538852] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 818.538864] RIP: 0033:0x7fc4cb119b19 [ 818.538873] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 818.538885] RSP: 002b:00007fc4c868f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 818.538897] RAX: ffffffffffffffda RBX: 00007fc4cb22cf60 RCX: 00007fc4cb119b19 [ 818.538905] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000080 [ 818.538912] RBP: 00007fc4c868f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 818.538919] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 818.538926] R13: 00007ffc3e6e636f R14: 00007fc4c868f300 R15: 0000000000022000 [ 818.538943] 00:18:27 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x3, 0x5, 0xfc, 0x20, 0x0, 0x0, 0x20400, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x7, 0x2, @perf_config_ext={0x6, 0x9}, 0xa, 0x5, 0x40, 0x0, 0x7ff, 0x0, 0x5, 0x0, 0x1, 0x0, 0x7}, r1, 0xf, r0, 0x8) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:18:27 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) 00:18:27 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) (fail_nth: 2) 00:18:27 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:18:38 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r0, &(0x7f0000000040)=""/169, 0xa9, 0x8000) 00:18:38 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') timerfd_settime(r2, 0x0, &(0x7f0000000440)={{0x77359400}}, &(0x7f0000000480)) pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) sendmsg$netlink(r2, &(0x7f0000000300)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f0000000100)=[{&(0x7f0000000080)={0x5c, 0x33, 0x2, 0x70bd2c, 0x0, "", [@typed={0x8, 0x80, 0x0, 0x0, @u32=0x4}, @generic="b400eef0e7c3a668640eb268153a07374aff7be43b36820b32f619cc56fa4d70371392fc7c3735064b9fccc8f22b15bb312d4a6326f8168ff39a957ca149e151a955"]}, 0x5c}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c, 0x1, 0x2, {0xffffffffffffffff, r4, r5}}}], 0x20, 0x4011}, 0x4000091) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000040)=ANY=[@ANYBLOB="000000210f000000", @ANYRES64, @ANYRES64], 0x28}], 0x1}, 0x0) copy_file_range(0xffffffffffffffff, &(0x7f00000003c0)=0x6, r3, &(0x7f0000000400)=0x7ff, 0x5, 0x0) 00:18:38 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) (fail_nth: 3) 00:18:38 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:38 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB], 0x7) r0 = creat(&(0x7f0000000040)='./file0\x00', 0x102) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000080)) syz_emit_vhci(&(0x7f0000000000)=@HCI_EVENT_PKT={0x4, @hci_ev_cmd_status={{0xf, 0x4}, {0x8, 0x0, 0x405}}}, 0x7) 00:18:38 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x2a) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) write(r1, &(0x7f0000000100)="af", 0x1) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) pwritev2(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="e9", 0x1}], 0x1, 0x4bbe, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x10001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 00:18:38 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:18:38 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) [ 830.085283] FAULT_INJECTION: forcing a failure. [ 830.085283] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 830.087148] CPU: 0 UID: 0 PID: 40701 Comm: syz-executor.7 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 830.087178] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.087191] Call Trace: [ 830.087199] [ 830.087207] dump_stack_lvl+0xfa/0x120 [ 830.087238] should_fail_ex+0x4d7/0x5e0 [ 830.087269] strncpy_from_user+0x3b/0x2f0 [ 830.087307] getname_flags.part.0+0x8d/0x540 [ 830.087346] getname_flags+0x95/0xe0 [ 830.087372] user_path_at+0x27/0x90 [ 830.087398] user_statfs+0x86/0x170 [ 830.087429] ? __pfx_user_statfs+0x10/0x10 [ 830.087459] ? find_held_lock+0x2b/0x80 [ 830.087483] ? ksys_write+0x187/0x240 [ 830.087509] ? lock_release+0xc8/0x290 [ 830.087551] __do_sys_statfs+0x8a/0x150 [ 830.087582] ? __pfx___do_sys_statfs+0x10/0x10 [ 830.087615] ? perf_trace_run_bpf_submit+0xef/0x180 [ 830.087641] ? __pfx___mutex_unlock_slowpath+0x10/0x10 [ 830.087667] ? perf_trace_run_bpf_submit+0xef/0x180 [ 830.087697] ? perf_trace_preemptirq_template+0x259/0x430 [ 830.087733] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 830.087762] ? __pfx_perf_trace_preemptirq_template+0x10/0x10 [ 830.087796] ? __pfx_ksys_write+0x10/0x10 [ 830.087828] ? do_syscall_64+0x85/0x390 [ 830.087857] do_syscall_64+0xbf/0x390 [ 830.087884] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.087908] RIP: 0033:0x7fc4cb119b19 [ 830.087925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.087946] RSP: 002b:00007fc4c868f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 830.087968] RAX: ffffffffffffffda RBX: 00007fc4cb22cf60 RCX: 00007fc4cb119b19 [ 830.087983] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000080 [ 830.087997] RBP: 00007fc4c868f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 830.088010] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.088023] R13: 00007ffc3e6e636f R14: 00007fc4c868f300 R15: 0000000000022000 [ 830.088056] 00:18:38 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:18:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) (fail_nth: 4) 00:18:39 executing program 4: r0 = creat(&(0x7f00000001c0)='./file0\x00', 0x2a) r1 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) write(r1, &(0x7f0000000100)="af", 0x1) r2 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000140)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r1, 0xc0189379, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) pwritev2(r0, &(0x7f0000000040)=[{&(0x7f00000000c0)="e9", 0x1}], 0x1, 0x4bbe, 0x0, 0x0) r3 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6002, 0x0) r4 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) sendfile(r3, r4, 0x0, 0x10001) ioctl$EXT4_IOC_PRECACHE_EXTENTS(r0, 0x6612) 00:18:39 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x400}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x40, 0xfe, 0xff, 0x1, 0x0, 0x800, 0x28001, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x3f, 0x97f}, 0xc830, 0x200, 0x5, 0x6, 0x7, 0x403, 0x3, 0x0, 0x2, 0x0, 0xde}, 0x0, 0x0, r1, 0x1) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="579abcba40000000007fffffff0eea74b2"], 0x7) 00:18:39 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:18:39 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:18:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) gettid() r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) [ 830.530895] FAULT_INJECTION: forcing a failure. [ 830.530895] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 830.532862] CPU: 0 UID: 0 PID: 41225 Comm: syz-executor.7 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 830.532908] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.532928] Call Trace: [ 830.532939] [ 830.532953] dump_stack_lvl+0xfa/0x120 [ 830.532995] should_fail_ex+0x4d7/0x5e0 [ 830.533042] _copy_to_user+0x32/0xd0 [ 830.533087] __do_sys_statfs+0x121/0x150 [ 830.533140] ? __pfx___do_sys_statfs+0x10/0x10 [ 830.533189] ? perf_trace_preemptirq_template+0x259/0x430 [ 830.533242] ? do_syscall_64+0x85/0x390 [ 830.533273] do_syscall_64+0xbf/0x390 [ 830.533301] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.533326] RIP: 0033:0x7fc4cb119b19 [ 830.533343] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 830.533365] RSP: 002b:00007fc4c868f188 EFLAGS: 00000246 ORIG_RAX: 0000000000000089 [ 830.533387] RAX: ffffffffffffffda RBX: 00007fc4cb22cf60 RCX: 00007fc4cb119b19 [ 830.533403] RDX: 0000000000000000 RSI: 00000000200000c0 RDI: 0000000020000080 [ 830.533417] RBP: 00007fc4c868f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 830.533430] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.533444] R13: 00007ffc3e6e636f R14: 00007fc4c868f300 R15: 0000000000022000 [ 830.533478] 00:18:39 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) (fail_nth: 5) 00:18:39 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) gettid() pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:18:39 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x8, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:18:39 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) [ 830.880953] FAULT_INJECTION: forcing a failure. [ 830.880953] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 830.882923] CPU: 1 UID: 0 PID: 41483 Comm: syz-executor.7 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 830.882952] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 830.882964] Call Trace: [ 830.882971] [ 830.882979] dump_stack_lvl+0xfa/0x120 [ 830.883009] should_fail_ex+0x4d7/0x5e0 [ 830.883039] _copy_to_user+0x32/0xd0 [ 830.883067] simple_read_from_buffer+0xe0/0x180 [ 830.883106] proc_fail_nth_read+0x18a/0x240 [ 830.883136] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 830.883165] ? security_file_permission+0x22/0x90 [ 830.883196] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 830.883224] vfs_read+0x1eb/0xc70 [ 830.883256] ? __pfx_vfs_read+0x10/0x10 [ 830.883282] ? lock_release+0xc8/0x290 [ 830.883317] ? __fget_files+0x20d/0x3b0 [ 830.883353] ksys_read+0x121/0x240 [ 830.883377] ? __pfx_ksys_read+0x10/0x10 [ 830.883412] do_syscall_64+0xbf/0x390 [ 830.883440] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 830.883462] RIP: 0033:0x7fc4cb0cc69c [ 830.883479] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 830.883499] RSP: 002b:00007fc4c868f170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 830.883526] RAX: ffffffffffffffda RBX: 0000000000000000 RCX: 00007fc4cb0cc69c [ 830.883540] RDX: 000000000000000f RSI: 00007fc4c868f1e0 RDI: 0000000000000004 [ 830.883553] RBP: 00007fc4c868f1d0 R08: 0000000000000000 R09: 0000000000000000 [ 830.883566] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 830.883579] R13: 00007ffc3e6e636f R14: 00007fc4c868f300 R15: 0000000000022000 [ 830.883611] 00:18:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) gettid() pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:18:39 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:18:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:18:39 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) gettid() pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:18:40 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() r1 = fork() kcmp(r0, r1, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) ptrace(0x11, r2) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYRES16], 0x7) openat$procfs(0xffffffffffffff9c, &(0x7f0000000180)='/proc/meminfo\x00', 0x0, 0x0) 00:18:40 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x8, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:18:50 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e6661740002082000040000", 0x13}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:18:50 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:18:50 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x8, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:18:50 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x13890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f0000001140)={&(0x7f00000012c0)={0x10, 0x0, 0x0, 0x400}, 0xc, &(0x7f0000001180)={&(0x7f0000001100)={0x18, 0x3f9, 0x100, 0x70bd2d, 0x24dfdbf9, {0x1, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x20004001}, 0x20040000) ioctl$PERF_EVENT_IOC_RESET(r1, 0x2403, 0x8) r2 = fork() r3 = fork() kcmp(r2, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r4 = getpid() setpgid(r3, r4) r5 = getpgrp(0x0) process_vm_writev(r5, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r5, 0x8, &(0x7f0000000300)) getpgrp(0x0) syz_emit_vhci(&(0x7f0000001300)=ANY=[@ANYRESDEC=r0, @ANYRES32], 0x7) r6 = syz_open_dev$evdev(&(0x7f0000000180), 0x7, 0x0) ioctl$BTRFS_IOC_WAIT_SYNC(r6, 0x40089416, &(0x7f00000001c0)) 00:18:50 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:18:50 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x0, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:18:50 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r2 = signalfd(r0, &(0x7f00000001c0)={[0x6]}, 0x8) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r3, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r0, 0xc020f509, &(0x7f0000000300)={r1, 0x3, 0xd04, 0x7fffffff}) r5 = openat$incfs(r1, &(0x7f0000000340)='.pending_reads\x00', 0x40, 0x4) ioctl$AUTOFS_DEV_IOCTL_FAIL(r4, 0xc0189377, &(0x7f0000000380)={{0x1, 0x1, 0x18, r5, {0x7, 0x8}}, './file1\x00'}) mount$9p_fd(0x0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180), 0x2309803, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@access_user}, {@version_9p2000}, {@msize}], [{@permit_directio}, {@rootcontext={'rootcontext', 0x3d, 'sysadm_u'}}, {@func={'func', 0x3d, 'CREDS_CHECK'}}, {@fowner_lt={'fowner<', r3}}, {@fowner_gt={'fowner>', 0xee00}}, {@euid_gt={'euid>', 0xffffffffffffffff}}]}}) 00:18:50 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:18:51 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) getpeername(0xffffffffffffffff, &(0x7f0000000840)=@pppol2tp={0x18, 0x1, {0x0, 0xffffffffffffffff, {0x2, 0x0, @multicast2}}}, &(0x7f00000008c0)=0x80) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:18:51 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:18:51 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0xad, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() pwritev2(r0, &(0x7f00000014c0)=[{&(0x7f0000000140)="726a9e99d0ed6b8f1eb3e908fa8c8aee3ff03f68f214ecbaa919299bc9a106e3749c4c5f432e45f5a0e948f7d80f029a7f615afba9671c5b9e7c6de8e5a68eb5e0089e2250a8921f4aa839c1673de62e3ae6566a59eab48c8f5cf1ade7cbca2e2eb94d83c311abd2c75247638ecad2c7625aaa8c56fad48e45a07bba7b4050233d9677640e655b790c9391ef9ab9a4be281d1b5e8a645b1704fcb7fc2d2e7230f8beb0018ba8a666fc7977696ba8d0c869b69c64098bda5f1690c6a4fcfce97b0ceb0678798ebb6b726236c173f3733b456f80342b5ad4dd9a5a7a8c90e4e049dc71efe4c7ea0c0a8e0af9d863f7d71a94a8a1f0205d71dcb317fb2a678e93eafeec2df0f595fcf1a96f40e5e41b6273958928a2cc0dbb6b3bd46061bf3346ae0c420d87b50a10578024325d6ebc0442bc2c729eaaa5f166f3ad20b27450039a99f4971a2a0db9bf107d9a9940b2270c2939834c7b57ca671245aeab7b161e8ee3d757bee1e0469add3272d0d075ca0ac37ba8ae3809bed415f6f569a5f44a191ec2e24d872c4dd87ce53b1d06b6e1b92516b5540f09bd9bd216d20acf0a3de26111c30504f0d230f46002b2be0ca3a8b5ebc5f885d0cd22f399bba96be2609299086afabd33a8d3706dce951f5373393a27bd228edb6d8ef5d9d020fcf4b3fa2bac9a903effecdaa6c7e32bdfbf2b940b6a47f6e0f34cbfceb992cdf4db15a56c643c5efc39d82c2c4e494961b49383f648f79b3c3678e947385fad0ad335e27dfd18e6797ded09f4a52e53a31d67739df89963e469fb04c2cfbbd0908838336343f4fa6b7a2b1c1f9aac6bab080564ac52dc94063f6d5c977b1f751a27739976c8d25339e7e7e91afb4da93805055e7e23404ad3ce9af0b406ce3c71d7583fa710daebdc7efe5fbd5dedcd78a78fc97b79bd8bb4a388eb54e9cd20c3956cc1c1c43906fca22907430cd83948b63978c9b87c1cf0b87d628de50de97e893ad162036f890a31a394743bfd4a743da9c3ec4394c1f491c2ee73ec2749d67076b1cfb18bcb87e9547a2186c86adaa0b2db17470a25f49a17f1d75dc3115952ef2353bc6cd39f875a48394522fe76c5a47e5b08c945ead698efbcf3f346464b2f9f6ffcc07029f8a1ea4b7efad2a17e0e7b51fd3144404d5b88646f32bf37836643e48cdd614ef0738a0fbca81fc768a2cddb05341458dc57df341ac514f93ef20451d943d229033117cbd76003917d9b09229f6a9f61f55222bd7b5c0ddc7fb411a08baaf554e4261a14e6643cf8761a156b19ae8591cde5f10cde10621e7c4128be1293e7996e639969ee830ed3eaa195fa4410b55dc7093b4df2b8534f66441c5021775efc36525a9400b5de5e4893fd4d0bb1a792c905b88b6aa4a23ebe57c885ce901cee41693ed3af092e00b7299cc785059bd544852790f3909875178314ecda4d0f15c7cb0c51d910821dfdfba50f18b5f1a46da94ee2f5ee8ee0d6573d87c502867993aa095d8b89139aba846ac62c1f4e4c978796c31c9ef7c754783a27eb8e70432c28014f489a127e621872ae2c83be549ab04143a18a9cfadc0d0f311864304e3109832e7e6427c98cc2e94c49747f08a1ec794f2a856bd7c65f18063a85e41d4fff47c8ebce002a43f2510a3aef8f5f50e8e8ead0b7f4c430aa7e595f141affbdea048cb849bc6a23e0ed7b9aa69a2707cafa1489649e354784185dcd974a9c44b024379a9bf15954c5c340906b4b2c97260661623c27b5b7873a0e27f78d269028c31678381d4ace88d241425a45bf762dbe28a1d0cdc36c79ea60018b023dfe4bc834692dd94eae8f4dcd68f73dc7932958f15fc28e0b58ce5da87ea2bf2247011e89df3f62cb8a9943811c86f6183c811df584d55f83116b541c51f7a638a011a81c8c877898792f90813211830a5b1dff5f1359f4646d856b2f1aff2245aee3e987669f00629f5b6817fa5d4e07e721c57721c5ab72f92c31e60db99e78aa8c38f74afd27eae642b116387fc63278d763b6faaa05839187d7dde79c3e7fd3dbf8a492ef7e5c67fd86838d746cf6579c1f1f51cd43fb5d2831c7be6cd09d581e95d2748cf51bd150a6b8c86cf940ee676d9f94a878700d66664eea86c02f52b13bedc59f359ed0ccf354bcad885b0b8234a127db56998bf646e4d52af3b3230f97acabafa3b86502732f71b6e9ca463a98bbecbd7c4093cadf6e44c6f4741aeebe59a73d20d79f561b695926348928008d882e827e2123531e1212387538817a55cdfeb3d616adae33da22edcdebbdc8a29cad24fc901c8e1c6bcf41274ad5676fd8709577f15f129584e40ba48feefdc5df76f480d6b9dce22e1981d7e1b1f07e5100345f65f763f25d055c0635ff4150559641c47b63216a9da4a9c2f35a7a26ac510c29689b04350360a5f1d830151e9a2f2fea5b6a762f9ee7bdc39e00daca9e847896d0bd46747a3c3e757289d26ec058e064bc7bea57e13eac89483f352f596d94d3bc635e71a03e7ae510183b9b0ba4ba6365494e255268d6ad4546100eedebe3457a7a7972e18b6f51fb7d1d2420114ae5eb3c7e6041c7bc522e7a6b713357de16d105560b70da90f38b9b214f2196cff3d75fd9644360e74cc5b2eb1605c14bcc4ca9f595616d57f8eb663fa2f79dcc764390980e3465252acb3786fc0bc98773aa20695b85630c09ba742e59ce9affa1cfc0bdbb1326a42eec910c86a51ed9c00b70fd5efeb510991363cfe503265fb870d04c7f4455ac94a747a85edcdc0fda3eabf3a39dae27b31e1159da3a06457096ee07334f0383eaa0bc199c85392f9189b7d38e2afc36c4aabfc652eb632fea8ffcee2d8234dab720fec2cab8be7fca4bff2c008f6005de0220a3ec2a04731765433a3c583c7cf9b9eb10e02dfb2317cb63cfd1b2c7d5cd04e2662f60bb2fdea2a2ac41304e5b0caa1913f099ad0665b73ce33629aec0fc4195e80a05dccf4e23376ba5f5f69abf453dd60e14c0cb6ec3a3522e21f0e9435848e68d3de017e55843efda6a8b610a1bfbfdec4ea74184db4503c780eb4eef7106d042e9c845c7067500d7a04c578123a83388000cbbd64025dc2615395b2d56ec1e95b5279cfae35e8f1070372a491b8eb89ce3b6fc76651f0326a1312297516fe9440c01d89ff6ccc75e72dfd572898580324ad07d37d0a9838b185ba713d99d81f81279ba054a669a02a8abd317769a3d175220c394e2f2ee4c32de3b10b6624f1760fa82fb2d6c69c9a43923f8397d474f3d372ddcb369783d9dfe2d552ace0aaa0f5ce67f8142926eb8708a73cddead04b4d851ff9be817277d6fc4cd967c87d4497911c3e1a193c475d537093b77c5417899af8bb281a80ce370dcabd781d8e2b3cf2430b811c9a496f89d2f8a6857d47921269260d2b5d165d9dd5c88391f1dfe998c2cc05aa5458e3c3e7c69dc770499c7de17cd5d8070b2303fe31c44f7551ed0009235198a2086fd8620e04203245601f3e8a3d9f3f07dc72f16af5b31b03aaf2d4006fd2d388bc75ceecfd86cf40d937583c05f284cc27fe88fe7b8de4fcd49714df88d6497b2bc8a93a5e6242717eb3ac57648c599b7b845e77b457f413eb2d834652e7233a1df72e2575fc02bf470d5c1a6200f0677cced41099357815583a8c3cabb9dc84120e9ce11436a8fe43eee703655d0bc6aee35353293319867e3c3e1fb8915995c5726e4cc59474092c8435dc20da123257ab43a29df63f046ecb114ceecbe01495f699597e86106ded7e6f09487e37c6c6cc5a111f098b790a8ffc8340d13e61fc1e687759b29b8cb05fe4469a490cef34f387f1251e77ce06916024f390276664cef8520f3530c16e93fc3368748ab106f40de68c7d041056ee74b2c93b35d7cded24a12ac4880577c3409850ac5ae23dab6cdf49f1a56bd535b7bf8c037c89819000c381b40df5b8820b173d4b379d00deae180c47bd94eb3e51d23055835d0e202607534e263f73b293e5368541465c477c45241a3cd2dcd0fcb8d6e7f82e54d3f76c68ac5a251d3ba786c4e47b623e834c36b933c7d099e4438d7d15778683e06abcf70ab84b92a77a5d4ead648789768dd461b70a73b15c371ca2bd7465c4872eeb7702ea12773c8657e472a5b0077b49363a1927062c556683226f59bedf7df9380bef44c8fe1a79ab14c349055e38f7c04fd6f7232ddc8e0e5fc6806a42b5874f6d79360168ff5c884f845e5e643f7c706f9d607dc3b1af7d5002cdea3ae9eca47c09b49622c00471ee1641937593a5a8331ca4619e4a9f5632b4f54ea61561faa6ca3b31d9c6a29d87930e9f9d8fd1d5130705eb05b1b56cbfdf43a76572dca2484e9d2db429c89f716f6d5fdfff9b1bba7e41c13247b2f3c81a1e0dbc1b3469cbe36b161a250cf2ab5ba4201cedd272fa5da93ecc320b205d1e5f972ad7cd9a98fba54684364ba809c6a0f31ad2581f14fb1e936925eddd4471e7727ea7ac03c0747651710d66a92d9324e1349897c810ff28424cf3792211c0f6b7bea45c6d7ce3177af50358dbe02e3608a222c1227b2575c2f53c3a324c6e691e87cc85bd64b3e023b753a8aed861f8e80596582535ac8d94cc8a4c4b542f98e4450d88faf67ffb5dec32bae7fb87c994b6950b0bbdf772bf261f4355531c783db1ee1b0f6adea954b18281299f4fa43a323e1697192e9841d349eb962daf09736e95d1e11a53d8648ef1f52de13a905aab7369691f4c5ee41c28ec81caa7472b4d0490b5e03273c98482d003a012fc5ba918ea7e6b714f304bd1e4990627e535c02da15427085351c0c749387b94ab6065d8efd9d256809074e6087c0d8d13bf1330e9bb6d3b3a9255fd0b146295b833c9eafcc01dfd5743227dc64d8115c179c52c0500747b14357df48a4e068d23354afadb059144b3a16f3890c5e157a4b9e91cefb82d3361086a7f9978efa0f5e2950590f7647f37a17ffe604b6c4cd7cd6f3471df382fbef4c142e230bdf9dfa06f9e43c3042d8627a342c5dd5755469902bfdd16eaf2b070d9afca5818ac11d676a9be6ae65201c7213f80d0e02fa9e6efc97d74004f2ff1412fd22b1a7bfd6da2eb06317e7ac19c162e7f5520bf24cb449817d562d3e281a410aacaa81c4acccef2acd3d284a4020413d912c8a561a2711b13914896b32906fe6f7c3c14c772c59202b45b2ce3591376340907cf4c00d3328b38186f8434ba4d8579eb6aecf3aeae4ca429aefc7cea08f0c32e7093744efe54c8a3791361782f7061a93535ee57979f0f6e1da9d0678924e75c66145e1d189573f1469b47d7aae0aa8c924acf9c313bf4b34bd6ca2e584cddeac723749a3109517beac0b8aee6979dee813e0c6606fc92ce50620bf84a74f401b4b19e44bbfbc0a62ba87b3afc2ea60b8d5df8cbc3d2583c60c5b5bd13d216c681baa992fc57132ec685b92ac9ee5942e907af8d47feb3208dd3ec8b9d6b265ab360427b3bd60cb169d8addec1166aecfa43db604f93d5cce59318a0f775fdd71059fcaae9f207a27be95594853d68526cdf93d087a22cbfd0e88672e2948d1b3588260897731d183381725b18a415439829e7743cabaa747753906d96df5021328639f84f542ce6ad6870ffca1ca0e62adc4c8d397cb039f2b95f335cc876998e7b060c08ebc607b17f6aa7b0b1908bf7c67a370ce267da81d7102de026ee37a0416df085fc992fedee2cc7397caf63a30aed6f86f1175ec33de336752418b3a00af3387b17710dd285eff072887b7134ea0c992fb19d1559cd07b3cbc20ffdb0473", 0x1000}, {&(0x7f0000001140)="c0f8b9d792025469cc1b7bc645faf23e3cb826667f5a79b155aa61aa666e40f1726d2df82a52f6dce19202a63cfd0befeda3a37817be094ae6db03383469b3d668ed87d667cb87b4f9e99f8f6c0965944d869b4430a9515661d97fc53bf6d5e0bb27bdfd229a6451daf0918a33b011ed8f197d9cf9790ca7dd4d468636e7f9c020e8e66f907b10861776c6c0f552ca52326b18aaf7c94c8dcd54647cd4d67a0cab556fd2bb04da2c8f49b510130980ecd46e2fb0a82e0dbc", 0xb8}, {&(0x7f0000001200)="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", 0xfc}, {&(0x7f0000000080)="a238709c81b2bd57a746d55ab84f10d6189af8cd6586ca9722aef24382d038b54df5e9c4f607a00b3b0ad5a824268e2c5fc43a4834874899749c16802eb2d705bc8f", 0x42}, {&(0x7f0000001300)}, {&(0x7f0000001340)="6fe125abe2ab5e5dca80fc9f407967e34cab0cf84d9929dfef3a6706964dac02d398", 0x22}, {&(0x7f0000001380)="511782a93c8907571dfe422e436458c0", 0x10}, {&(0x7f00000013c0)="3e6d75f8785519fb80d24dbfd781fd304b7ee51d83d7994eec2da76883a1f386a424531fa867d212058ce585a2d5c49d274a441bdb0b8feda16e51508f9ce14d3ad069fe01e82d40bd304ebcb852a9b92c6494bdd65b145c1ecdc68331714e59e526edf0114923a4c5a9e28054eb580318e86ff0384071679f5a5655977efc92b95d548fbd0cc495a585929d3b081390ccd6e9828910cb3af4a1c0e102959c565d4f82f18e866fb106b32902c99a47ff754247b4162972b9b632d32236f17bf2a9339ab555dfddb76b2f", 0xca}], 0x8, 0x6, 0x8000, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x800000, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f00000015c0)='./file0/file0\x00', 0x40000640) mount$bind(&(0x7f0000001300)='./file0/file0\x00', &(0x7f0000001540)='./file0\x00', &(0x7f0000001580), 0x200010, 0x0) 00:18:51 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="0409401620"], 0x7) 00:19:02 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:02 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:02 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x0, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:02 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) pwritev2(r0, &(0x7f0000000000)=[{&(0x7f0000000080)="c222f1df3f578be774dbdcc9f5273d65d45cb52eb7d95805aa4cc6d6ed1cd6266f3b658463dee9c5577597214188ae04ea6ad233f24d9d0547b85086a9d5b80bdc3f29ff2a46943cfa9fe2b9865ddb07", 0x50}, {&(0x7f0000000100)="bc2449c98a39326cbb907467c89c4aa4b2dbbdd09ba29f22ffb29be2fad6f2db50492f4c0115cde372f762b81bc85df88e00722d225b3c576ce57dbaa4354c0eade5fd4d76840920e4c59a439fa501f75cb6f9bef6ee84c7323497dad52d680dcc23f3bd81e9b20590a5ae11", 0x6c}, {&(0x7f0000000280)="474d0dc9f0ea9919cfbd5802420802d47509e7a2b66c5646bab9f4a396e1b9c77a43a737e46f992099f6ecffc6f6f9efb35b5e8914a9968db9c7e7f6197e9e3da65fcd23f893a2201c849cbec448c162ddff19e1ab18f93da3545b19a0fab784ae9cdf975ccb252c3bcf7f5c36931b8bf07bcadc286571ad35f6ee2ae83b855a7d5e719a1e173b70daf6f32ebd56b1bdd815394bbb37897b4a4e43bb321cffa7d90c2e5b4a081220a9885553f122e904eee4ab8cb8ad1fa598c3d7db44d4d6758bd8899bbd4721899e43fb23b8f600"/220, 0xdc}], 0x3, 0x25d, 0x5, 0x8) perf_event_open(&(0x7f0000000180)={0x6, 0x80, 0x4, 0x3f, 0x2, 0x2, 0x0, 0xf4a, 0x8200, 0xa, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x0, @perf_config_ext={0xe9, 0xff}, 0x48180, 0x0, 0x5, 0x0, 0x7c54, 0x6, 0x8, 0x0, 0x8001, 0x0, 0x800}, 0x0, 0xc, r0, 0x8) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:19:02 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) sched_getaffinity(0x0, 0x8, &(0x7f0000000300)) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:02 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e6661740002082000040000", 0x13}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:02 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:02 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r0, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, r0, 0x4) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$EXT4_IOC_CLEAR_ES_CACHE(r0, 0x6628) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:19:02 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:13 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e6661740002082000040000", 0x13}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:13 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0xa) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x200000, &(0x7f00000001c0)={'trans=fd,', {'rfdno', 0x3d, r1}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[{@cache_mmap}, {@access_uid}], [{@measure}]}}) 00:19:13 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x0, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:13 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:13 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xf) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x2) r1 = perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x34, 0x9, 0x1, 0x4, 0x0, 0xffffffffffffffe1, 0x18806, 0x3, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000000), 0x7}, 0x800, 0x9, 0x1, 0x1, 0x8, 0xab82, 0x800, 0x0, 0x10000, 0x0, 0xfffffffffffffffd}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0x1) r2 = perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0xff, 0x65, 0x3a, 0x2, 0x0, 0x2, 0x804, 0x8, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x80, 0x0, @perf_config_ext={0x1}, 0x2800, 0x40000000000, 0x6, 0x8, 0x7fff, 0x0, 0x8825, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xa, r1, 0xee5b1633edc61d0d) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f0000000040)={0x0, 0x1, 0x1400000000, 0x8}) syz_emit_vhci(&(0x7f0000000100)=ANY=[@ANYBLOB="0f04094016205ba5baddf617e43df8cb09bc96a148f135d63c41e1fadaeb9c7079bcd787283ecdfff0e1741ea66d3227471f27413038d5e0085c1339db476234ce7da261217ff70ba5ac6510d6cdba83c14235749315e192bf18d27f3a12409c091c140d9cbfa23e70f0664b3db0c80ffd333617684fa452fd911ab7c9"], 0x7) 00:19:13 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:13 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1]) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:13 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) [ 864.416846] kernel read not supported for file /43238/net/snmp6 (pid: 36168 comm: kworker/1:2) 00:19:13 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYRES32], 0x7) syz_emit_vhci(&(0x7f0000000080)=@HCI_SCODATA_PKT={0x3, {0xc9, 0x83}, "a4bed4e192a6dfa251fa71ce7f0c7c25a00dfb3b5d3b66e9d1ec58a0ec9781b71ec4cf196eb92fabb4c65defb5d265e8e982ac389bc3a79c646861f9f3f669e1a84041cd7f52b35baceff171ad7aa7e30636e40285338edfa64244715e69f8475fabd2c27d98ae0340f1f94be3d9a88d7ff5f77231c3749997475e31d69d08b9ca2741"}, 0x87) r3 = fork() r4 = fork() kcmp(r3, r4, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x80, 0x5, 0xfc, 0x0, 0x0, 0x5, 0x10, 0x4, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x9, 0x6}, 0x2000, 0x4, 0xc9b, 0x2, 0x0, 0xa8a4, 0x80, 0x0, 0x9e, 0x0, 0x5}, r3, 0xa, r0, 0x1) 00:19:13 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:13 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e6661740002082000040000", 0x13}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:13 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:13 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:13 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:23 executing program 1: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:23 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) [ 874.763077] audit: type=1400 audit(1760746763.488:14): avc: denied { tracepoint } for pid=43979 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 00:19:23 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:19:23 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = fork() r1 = fork() kcmp(r0, r1, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r2 = getpid() setpgid(r1, r2) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYRESOCT], 0x7) r3 = fork() r4 = fork() kcmp(r3, r4, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) ptrace(0x11, r3) setpriority(0x0, r2, 0x0) 00:19:23 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1]) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:23 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:23 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:23 executing program 3: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:23 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f00000009c0)=""/156, 0x9c, 0xfffffffffffffbff) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000540), 0x20000, 0x0) ioctl$LOOP_CTL_ADD(r3, 0x4c80, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x119b4, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) r4 = perf_event_open(&(0x7f0000000680)={0x2, 0x80, 0x0, 0x6, 0x1f, 0x7, 0x0, 0x1, 0x80000, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0xedd, 0x2, @perf_config_ext={0xfffffffffffff834, 0x7ff}, 0x200, 0x1, 0x3, 0x7, 0x5, 0x3, 0x20, 0x0, 0xc0000000, 0x0, 0x9}, r1, 0x10, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r4, 0x2401, 0x54a0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x100, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = syz_mount_image$tmpfs(&(0x7f0000000240), &(0x7f0000000280)='./file0\x00', 0x4, 0x3, &(0x7f00000004c0)=[{&(0x7f00000002c0)="7ec81c85d564c57e7b5cf55669069d60ec59c925611c3e551901a8c8863f4eef20be7ee145cc881a95dbe09961dd598c9750c7094758a3b666b06c35bc5af4fba7b298baf3bcbf8da3a2a37b8d0b34acf60f11d18617a7", 0x57, 0x8}, {&(0x7f0000000340)="3d1e29f60a1f7eaf3deb6887729bf2933eeba56084402ff29b64b7f7e23a5287521c3c5d0656411faa9d16f5901d84b0e19f571c15694fd78fa86e62ab79ca1d89acef7ae1196c1d8571d31a0700fabe317f5c7586127aa2c0d30283a3bb8dad12d7c28cb4a0243ab4a40731681e9165b737a784954aafc6b84a745699ff7746fbbfa9ab8a489b51d3ce32227bcf1b6619", 0x91, 0x7}, {&(0x7f0000000400)="679da66c1c8090eb8fac26d24f0139b3929e3299c7878d6aaee0403f95672d852d085bca2b1176915fde836c231d241425b232912b1f382cf89146906ab2d076f73c693fccfc46414ed376723bc7af5f7fb31998c1c6e433f32f9eb0141f4bb8dcb83322569b0e3d6c83bce9f3d0e97cb29b6507d0d200b52cb95c3cf71b6c8803dd5d1a0344e717502877e74282fd5d8d0ee5dc0d635d6d66e66ac46a3f02b81c549563a537652af47c593e7cad639a314a69767771b4e6", 0xb8, 0xd63d}], 0x240001, &(0x7f0000000780)=ANY=[@ANYBLOB="687567653d7769b1fca2d7fcaa58177733fab83ecd7468696e5f73697a652c687559653d77697468696e5f6c2167653d616c776179732c7365636c6162656c2c005f0d7a70d972613db82d586b28bd4080d6547c3fb2efe9ffffce62d63d84704d30c5078db4efcbb18d21636fb019921f003aef50010321c500a3326912d9045cc92c09840080ecdee28deeb3df300cd9853afaa57014195bb406a1e85b552d8c8019f5fdb1810cbeae21cb16d97a79e24dd3ed70af1d93d47f3bfa8076a6cd1f66a15e5630ab6174ef34c302eb8ab68b9083e6d48b3fafbbeade770a6b17b73eb3c527229effc54a7486a4fa8d3f27f7b155efba7843b8d1790cbd309a2836ecec2ae6d86a59982133cdb9654705000000000000001a000000000000000000000000000000004fb15af1ae105f644993510d9701869b8035e6db4fa2fff89251f5f174f4f03eac70d1a825b5df782e8dfad7bcb1a5fb53aaed931ff8aa6f551f6448b12e4220bd42bcd2edb4d1fcd44ffa964e0d4df3ebe1c4d95d3d679cc4e7882279c2f498a5dc4d318fa25b0c75990e09fa18e2d42821524144dbefbdb3adfb7d233c922c1cb7a58443f440f4a5267774b9edac73ba181e5fd509507d83798cac98c8c9d18366404d3660d6e498899063cf23e17cd1c898b2be05498c2dd8dda251b279aeb567beb8b31277396e97a852c248fd2a25b9cf047d5e740d4f908e7fc28500"/527]) readlinkat(r5, &(0x7f00000005c0)='./file0\x00', &(0x7f0000000600)=""/69, 0x45) perf_event_open(&(0x7f0000000080)={0x6, 0x80, 0x0, 0x4, 0x4, 0x8b, 0x0, 0x10ffffffff, 0x40008, 0xb, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x50be, 0x0, @perf_bp={&(0x7f0000000180)}, 0x408, 0xbce, 0x2, 0x7, 0x3, 0x655f, 0x859d, 0x0, 0xaddc, 0x0, 0x7}, 0x0, 0x8000, r2, 0x1) 00:19:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4a8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) openat$full(0xffffffffffffff9c, &(0x7f0000000140), 0x400000, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:19:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:23 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1]) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:23 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:23 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="000000000000006ad6e8d7c1ea73be964e2c1acd5a15c253a15312379ed3c2f88e4e8f31952c12c79900d047e062e2e09ef9e8c268592414"], 0x7) 00:19:34 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfff, 0x0, 0x0, 0x40000, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000007fc0)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @remote, 0x0, 0x2, [@multicast1, @multicast2]}, 0x20000) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000200)={0x2892, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e24, @local}}}, 0x108) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/74) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:19:34 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:34 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) perf_event_open(&(0x7f0000000080)={0x3, 0x80, 0x7, 0xff, 0x7, 0x3, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x10000, 0x2, @perf_bp, 0x4200e, 0x3, 0x6, 0x8, 0x6f, 0x7ff, 0x0, 0x0, 0x8001, 0x0, 0x100}, 0xffffffffffffffff, 0x5, r0, 0x9) 00:19:34 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:34 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB]) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:34 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:34 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:34 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:34 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000", 0x21}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:35 executing program 4: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = getpid() setpgid(0x0, r4) getpriority(0x1, r4) pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x4000044}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4081}, 0x24040010) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x4b, 0xff, 0x40, 0xf8, 0x0, 0x3, 0x502e0, 0x8, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x10000, 0x4, @perf_config_ext={0x7fff, 0x710}, 0x10, 0xfffffffffffffffe, 0x3, 0x3, 0x1000, 0x10000, 0x6, 0x0, 0x0, 0x0, 0x80000001}, r0, 0x0, r3, 0x2) pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x500002, 0x246) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r5) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:19:35 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) fallocate(r2, 0x52, 0xffffffffffffffff, 0x3cc2) open_by_handle_at(r0, &(0x7f0000000000)=@reiserfs_4={0x10, 0x4, {0x1, 0x2, 0x8000, 0x80000000}}, 0x204000) syz_emit_vhci(&(0x7f0000000180)=ANY=[@ANYBLOB="040f094016ccd98bf394768cc1468149de4aa52000"], 0x7) 00:19:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = fork() syz_open_procfs(r0, &(0x7f0000000140)='loginuid\x00') statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180)=""/18) 00:19:35 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:35 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB]) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:35 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0xfb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfff, 0x0, 0x0, 0x40000, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x3, 0x0, 0x0, 0x0, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000007fc0)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}}}, 0x108) setsockopt$inet_msfilter(r0, 0x0, 0x29, &(0x7f00000000c0)={@multicast1, @remote, 0x0, 0x2, [@multicast1, @multicast2]}, 0x20000) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000000200)={0x2892, {{0x2, 0x4e20, @multicast2}}, {{0x2, 0x4e24, @local}}}, 0x108) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)=""/74) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:19:35 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000", 0x21}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:35 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) syz_emit_vhci(&(0x7f0000000000)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x2, 0x2, 0x12}, @l2cap_cid_le_signaling={{0xe}, @l2cap_le_conn_req={{0x14, 0x8, 0xa}, {0x800, 0x1, 0x6, 0x0, 0x8001}}}}, 0x17) 00:19:35 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB]) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:35 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:35 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:35 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r1 = fork() r2 = fork() kcmp(r1, r2, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x20, 0x0, 0xfa, 0x4, 0x0, 0x5a1e0921, 0x4001, 0xb, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x2, 0x4, @perf_config_ext={0x6, 0x30000000000000}, 0x3428, 0x6, 0x8, 0x5, 0x5, 0x4548, 0x0, 0x0, 0x80000001, 0x0, 0x800}, r1, 0xffffffffffffffff, r0, 0x9) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x2000003, 0x2010, 0xffffffffffffffff, 0x0) 00:19:45 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:45 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:45 executing program 7: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0xfc, 0x3, 0x0, 0x0, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1000000, 0x0, @perf_config_ext={0x80000001, 0x3}, 0x0, 0x0, 0xfffffffe, 0x0, 0x0, 0x0, 0xfffc}, 0x0, 0x800000000, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x916, 0x5, &(0x7f0000001480)=[{&(0x7f00000001c0)="b54840cb87d3fec172ab02dcd16d8197292a68a07a9bc6bd9ef76d219ac4d70ca1597f2f08663b055cb6ec215c98e51131ade9e74a2a7076d9a760d4a3", 0x3d, 0x5ebbe4b0}, {&(0x7f0000000200)="bb379f07bdca01d4aad952199d0b6a017ad9b9cb3eace23278c14003c29c7106146582bd8d8e2d634c1c6a3c4af907f26de2cdc1508529b9f6acd9560992d0aef4308ee2b80c881b5f478f329a59bd526e1a", 0x52, 0x9}, {&(0x7f0000000280)="d7ccfdcb9fab9f8ba7de0d39214375aa41f43f6a853a008419241298c1d11369eb4da3521b2351123c0d3fd955bed2f1756745baeaab5613705716a98ae8fb830414ab175216d169b24b2e7c90ddeab7da6b3229f669c08cc9286a70ee9f0d7d57d3d2902b55e42d4b56425fe68fd118ed923c49ac5780602d3ad3b3774fb1abe8c207b51916aefaaf37886008b05c1601a0d08a894fe5f3f1988979a8e0e38328d1422ded65cf69fbf947b2f7698febee1552dff2f9d4fec6745f9785e85e3b51c7da5e224187239dc118", 0xcb, 0x80000000}, {&(0x7f0000000380)="6c7c358c999ae56654b0c2e2d2e0c0ed268283876676871f1719ccf4a34da28dcba4506d3e82940b376dda41355bd4a39be3712b6754291e1597677dc7e6d6f201113c50f522c7c870bef0dab65be01d330328af63439b7141508a3b74cb728eaedddd3dfad757894aa2568058ab153556f876eaefe603f79d0178a0130f3e603072f5eb80071892a8ee161db9895520f882ffe76de05f8302440eb75d48364f329bb511c1c6ad3f103288c37c6b0bd8aa06fc32354fdea6a1f7077dec1827cac29b0bf0", 0xc4, 0x6}, {&(0x7f0000000480)="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", 0x1000, 0xfa4}], 0xae431c6358b0c8ab, &(0x7f0000001500)=ANY=[@ANYBLOB="506f646f74732c646f74732c666d61736b3d3030303030303030303130303030302c6e6f646f74732c6e6f646f74732c6e6f646f7473652c7375626a5f726f6c653d2c6f626a5f726f6c653d265c3ae324212d5b2c000000000000000000"]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:19:45 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:45 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./fi']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:45 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f044cad1620"], 0x7) epoll_create(0x101) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) fsetxattr$security_evm(r1, &(0x7f0000000180), &(0x7f00000001c0)=@v2={0x5, 0x2, 0x1, 0x45fe, 0xc, "491d602d0d1130a0c8425bed"}, 0x15, 0x2) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x8000) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000080)={0x10}) 00:19:45 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000", 0x21}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:45 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() r2 = fork() kcmp(r1, r2, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r3 = getpid() setpgid(r2, r3) r4 = gettid() r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) syz_emit_vhci(&(0x7f0000000180)=ANY=[@ANYRESOCT=r0, @ANYRES64=r0, @ANYRES16=r0, @ANYRES32=r3, @ANYRES64=r3, @ANYRES64=r5, @ANYRESOCT], 0x7) 00:19:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:19:57 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:57 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:57 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYRESOCT, @ANYRESOCT=r0], 0xa0) 00:19:57 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:19:57 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, 0x0, 0x0, 0x0) 00:19:57 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./fi']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:19:57 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f800002000400003000000000000", 0x23}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:19:57 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) bind$inet(r0, &(0x7f0000000000)={0x2, 0x0, @dev}, 0xf) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) statx(r1, &(0x7f0000000140)='./file0\x00', 0x1000, 0x7ff, &(0x7f0000000180)) 00:19:57 executing program 2: r0 = accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, &(0x7f0000000080)=0x1c) setsockopt$inet6_group_source_req(r0, 0x29, 0x2b, &(0x7f00000000c0)={0x5, {{0xa, 0x4e23, 0x9, @private0={0xfc, 0x0, '\x00', 0x1}, 0x3}}, {{0xa, 0x4e20, 0x0, @private2, 0x2400000}}}, 0x108) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r3 = fork() r4 = fork() kcmp(r3, r4, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r5 = getpid() setpgid(r4, r5) r6 = getpgrp(0x0) process_vm_writev(r6, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r6, 0x8, &(0x7f0000000300)) clone3(&(0x7f00000004c0)={0x200400, &(0x7f0000000280), &(0x7f00000002c0), &(0x7f0000000300), {0x18}, &(0x7f0000000340)=""/20, 0x14, &(0x7f0000000380)=""/232, &(0x7f0000000480)=[r4, 0xffffffffffffffff, r6, r1, r1], 0x5, {r2}}, 0x58) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x5, 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0xffffffff, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) setsockopt$inet6_MRT6_ADD_MFC_PROXY(r2, 0x29, 0xd2, &(0x7f0000000200)={{0xa, 0x4e22, 0x400, @local}, {0xa, 0x4e24, 0x3, @mcast1, 0x80000000}, 0x9, [0x4, 0x66, 0x5, 0x9, 0x81, 0xffffffff, 0x401, 0x80000000]}, 0x5c) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000001380)=ANY=[@ANYBLOB="f2f90429fa4c8536d889ad1d74c124ed31c3000730b8ad1875870000162070a6d832f93ba7e3819ae90a3cbcfa041bf8ec36a87840060071c2e2314877e2bd2759fed6855597e65daaa20d4a86081da668302f9d0ed58b91dd120490ac0c17bcfd895d072b839066f8be37d6aa868809fcb813244d0d8453f052479830461f4e7a5d6e78acdb8780834d042e9d8c4646d8e138d4a49bf55f0c30256de3fb8c66000000000000000000"], 0x7) 00:19:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, 0x0, 0x0, 0x0) 00:20:09 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f800002000400003000000000000", 0x23}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9008, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x6}, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x8}, 0x0, 0xffffffd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:20:09 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:09 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="c58b85aabda8bb"], 0x7) 00:20:09 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:09 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, 0x0, 0x0, 0x0) 00:20:09 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./fi']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:09 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f800002000400003000000000000", 0x23}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:09 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_sock_diag(0x10, 0x3, 0x4) pread64(r0, &(0x7f0000000080)=""/200, 0xc8, 0x81) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:20:09 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:09 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r3 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x4, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x4, 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x3}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$FS_IOC_FSGETXATTR(r2, 0x801c581f, &(0x7f0000000140)={0xfff, 0x7ff, 0x0, 0x7, 0x7fff}) r4 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat$random(0xffffffffffffff9c, &(0x7f0000000180), 0x200000, 0x0) r6 = gettid() r7 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r7, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r7, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r6, 0x8, r7, 0x4) sendmsg$AUDIT_TTY_SET(r7, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r2, 0xc018937b, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r3, {0x0, 0xee01}}, './file0\x00'}) poll(&(0x7f0000000200)=[{r3}, {0xffffffffffffffff, 0xa249}, {r5, 0x20}, {r7, 0x808a}, {r0, 0x210}, {r8, 0x1030}, {r4, 0xd4531abf7a04e8d1}, {r2, 0x20}], 0x8, 0xfffffffa) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:20:09 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000780)=[{{&(0x7f0000000100)=@abs, 0x6e, &(0x7f0000000000)=[{&(0x7f0000000180)=""/200, 0xc8}, {&(0x7f0000000280)=""/143, 0x8f}], 0x2}}, {{&(0x7f0000000340)=@abs, 0x6e, &(0x7f0000000640)=[{&(0x7f00000003c0)=""/97, 0x61}, {&(0x7f0000000440)=""/147, 0x93}, {&(0x7f0000000500)=""/202, 0xca}, {&(0x7f0000000600)=""/20, 0x14}], 0x4, &(0x7f0000000680)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xc8}}], 0x2, 0x60, &(0x7f0000000800)={0x0, 0x3938700}) perf_event_open(&(0x7f0000000080)={0x4, 0x80, 0x40, 0x7, 0x2d, 0x3, 0x0, 0x8001, 0xc0000, 0x4, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1f, 0x0, @perf_config_ext={0x9, 0x80000000}, 0x188d5, 0x4, 0x8, 0x2, 0x4a, 0x58f, 0x3, 0x0, 0x9, 0x0, 0x9}, r1, 0xd, r0, 0x8) 00:20:09 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:09 executing program 2: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="53f830b8771c04"], 0x7) 00:20:19 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040f04094016201c278c66c7aa055a64c24acfc76d678c785977270cdc28ba45eb4a98748a7e1f7d525d6803b3b8d887b2"], 0x7) 00:20:19 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f800002000400003000000000000", 0x23}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:19 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:19 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:19 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:19 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:19 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000", 0x1c}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:19 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000012c0)={&(0x7f0000000140), 0x6e, &(0x7f00000011c0)=[{&(0x7f00000001c0)=""/4096, 0x1000}], 0x1, &(0x7f0000001200)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x10}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xa0}, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:20:19 executing program 2: readlink(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/210, 0xd2) prctl$PR_GET_ENDIAN(0x13, &(0x7f0000000000)) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000001c0)) perf_event_open(0x0, 0xffffffffffffffff, 0x10000009, 0xffffffffffffffff, 0x0) prctl$PR_GET_ENDIAN(0x13, &(0x7f00000002c0)) lchown(&(0x7f0000000240)='./file0\x00', 0xee01, 0xffffffffffffffff) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) syz_emit_vhci(&(0x7f0000000280)=@HCI_ACLDATA_PKT={0x2, {0xc8, 0x1, 0x0, 0x18}, @l2cap_cid_signaling={{0x14}, [@l2cap_move_chan_rsp={{0xf, 0xeb, 0x4}, {0x9, 0x1}}, @l2cap_cmd_rej_unk={{0x1, 0x0, 0x2}, {0x341}}, @l2cap_info_req={{0xa, 0x7, 0x2}, {0x3}}]}}, 0x1d) syz_emit_vhci(&(0x7f0000000200)=@HCI_ACLDATA_PKT={0x2, {0xc9, 0x3, 0x2, 0x12}, @l2cap_cid_le_signaling={{0xe}, @l2cap_le_conn_req={{0x14, 0x14, 0xa}, {0x55, 0x100, 0x8000, 0x7f, 0x3d06}}}}, 0x17) 00:20:19 executing program 2: r0 = getpgrp(0x0) process_vm_writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000300)) perf_event_open(0x0, r0, 0x0, 0xffffffffffffffff, 0x8) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:20:19 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x7fffffff}}, './file0\x00'}) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = gettid() r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r6, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r6, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r5, 0x8, r6, 0x4) sendmsg$AUDIT_TTY_SET(r6, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) pipe2$9p(&(0x7f00000043c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) [ 931.157094] random: crng reseeded on system resumption sendmsg$netlink(0xffffffffffffffff, &(0x7f0000004480)={&(0x7f0000000200)=@proc={0x10, 0x0, 0x25dfdbfc, 0x20000000}, 0xc, &(0x7f0000004280)=[{&(0x7f0000000240)={0x109c, 0x3e, 0x800, 0x70bd27, 0x25dfdbff, "", [@typed={0x8, 0x7f, 0x0, 0x0, @fd=r2}, @generic="203e29ab72f7e92eb88a940d60b1046f4103f36b0cf0635535e17b8a1330ccee45b2d1284a51d42d15291d9697daf7afc472584327b7876a932dfbbfe6864cf94cecc7d52b189e41d23bcbe1ae515c04a44b10da3748a37396f01b8488e3b685946dd61d81c2732fbc5a50267602ff867c5dc5459aeba4fc0fc0e42a2938a1f284f50d21c82e54654a8f9970262cc7ffa6d467eefeef22fbe8a6a2faa72062d5bd3affe37dade69e312efbcfeea6c08e56b9f12a4ac147ef795ba31a1bd58d1dbbc6b57a579f731ac0e20080bd996a23d7851f5191ce19fd28c94286f59b4f9a210cc0e91e9fec8412abe1c71921351fd130a8f7157b6160d01a4e4ae1ea0ceaa562bde03cc2e3367ca589d33d1c4eca4a5fcb1be3bc9c84cefc758a506587c0a0f9696081545bf7974b0facc51e02da364ac302840291039819ebac326c3ec3de0d0533426af4e185ade543c2d73ff84d67f1412635b722c544d0913adbee4fe63e34dce83cbd0cbd5d555497a924d5350427ea77683db530caba67ace95eef6477792a45d5e049d5cb408350d56239839b03e9328e0a0305f0bafeee5414e981f8141cf3612c719e0757b9bab9053cf653dbc05352e9d500c159123a0cffefd415b70ff0a7396d6a880cd3cf5f779b8a8fdc14a324ae54558fc9b5fd1a3ada6f709c0a1577073c7dd90bb91d62f4e61d9b16a2268bca6068c487b2d0d88869d7efe2f8826d78e71462f20911e42d158096caf4837a80888950b935f087ee00c24f517ebb4fff7d02476f04b49ea810cda322d5d937e710fa4b86af67e31b1940791803d04d231bc44ae07d90ba28e9a50e1a2ce5782c126080c13f18ddc26036771264380f6470ad595231433f4b3053d9a940cd4b92f3ed38e7688463986988062c713c4b9653de4e605242a3992262bcbba1e2cc407376d08b26099dceae264a702f01d0d0dd3ed0d268504a59b93491d34c6497d5c362ba8cdf9d703f9aaacc715c82c682a52f50e7cf1539937b4c995a52fb95a3482d4eb3360c7052fc9097b0a442f889f8e3ee00f0e1c41ae1aed75e9af93872f0e21fd3b2da7f38b2211c7e934f0c29fb8e649475599167df22c81a2dbac95cf143b87d0ede9f01e9db35102293f795416a89d176cf5aabc586e1a0e34dd54d274644cd65a00439ca1c8e8d4175c5bcfabcdc12a0d19d03ec4ae8712d7f31adf4361395c1689ca4cd4c62ef57eec8afa9b8ea53ff5c67a70cbf0292f620d594326c22e4a397caffeb29bc3a2b9529422a3efce5ad87873dcfb34b09b173ce4e2f6cc9fa93bf8166783067f0fd0bd6aec6215c144dfe48951b15188b9665b9f295220e620d443e9a40f8696ebb8922a39220b70f2389c146749ed1b7e8c5c07bb270eab893b97329f7f2c5c39f28dbde78146dd1030b6eaad5989480e2334dfb8fe99dedee45f6ae9bdac3f352fc26aa11f839d98e6cdfbb2e06fcdcd1e539e12abde876ce8258803bf5dad70bd4f337c779508b4c6d563b8c78b849b446414cead0343fcf900a341a3622ebb65a5511ca0052feebc794ea56653231b3cc402524be438fe3795a06dbdc2de1f49af719c156291ca6a695b12564175773d16f5138f9712044874a686a5c11814e451f52967adc2698413fdbcd8f4c9214627d393d75c5ac4d91a2a17e49cb4ed9fe97ea13794d468a4de76a0c874a94d57638e90f46e39b2c2ac0a9cc93287cc4a6c929a0ef7440a54c8f6fed1aa1a93c071b1590cb08209487222ace7bca43f4345b135901d03cfb3753968bb4ad66a66c684f55499f93dba0da1cd02008c482b2032a3960bc063d399eafe32dad1057e9d2ea0ccc841977feab7a65fb77595e9867df117aa4b88b0815d3cdd44f2dd2a0783c64162c8698bdc052cb23285d8cacd03a30d9d1252093aaebe3f194bde5eecd45f3ead405d86aff470c72e4c581c0f53cb48952b8e874e03929a3f65a9bbef6e85d79d337fa46a87e8d5a7439ea6a66b0bbc2cae8ef9e3210ee4bfcf5ce23924699da4841c79c7a0af85c1c8d08d91e77f51988657dea948fec66bbf8cd0bab8c20260f0fae27f2b5b66e76a1829e26e1a1fa9ae2f793d2cd69ce251e9c9a3afc96c2d317d7704c7a99aa55cd3f654945548db1b5a71bc5f2de1a857cb7c2838a8023fb64fb7c9ecbc6f3a4ab727d1b2e71b25dec912436f632e9ac9f293ca5984c48c2c94b7cd4dfa74c9c69997a8d650ac3dba8a33945201837b2601e1f131a4ffb333872ff310dc69398ef55ae7ff050d2e73091066895eb60a40a90daa75f24cec6bf6a174246c6a7e5e7ba0c98df3d2dc46271b7262e4d084eb6abbba21ff99dff213a40f51b2e047b012f8ef5be62ad0520a5508134f646a428802cb65181f0029a78f9d34c461137b25023355d46ebd833085b87d1702b8dd05948ff433538a86bded7f0706b1947af93c5256ce24a42b6b544d81719cec5e973f1ef5fdb131ade6942fb3d297a4f7363bcedd07672e96c59174b1a09e53d6930bc9e86ba1939fe474abd433baa685f7a4fac9704cd6986b2e3e6aa5211877a22ab662a75544d8a1752cd02895a657045f3654588c1886816daebc2f949f6d870b48f1d3113e46f2fc664149be37ba7947a326d1b20382e6fc595bdc174fa3e5cbefed539ef66c3d16c2339b6f32427bd9304e1c0e0d503f909c6257473b73dd08df6a5abc1473b611d328c29c462ad4e139ab39a9d558b2a5014c2ef7e314ea2a7cb59d48f339ddd65a34d581fa331d55066e62a5215232d23e5b63edbce1da11d6929471af1b19d08a3934354f10f914f84b4cc88f190e0bf111a136274e26d8aad82e6b6813dfc5dc266728e07b053d9a2ab22a6fb097d9b53ea8826701e97f60386abbeb4b009d4214476267345434f3393a0437fb7e8dbd9a9a9f6a3366a25dbcdbd14dc18ada4989d19c9b20a18488c08240f37451dea1f36d0ae78010b80effc085bd960d86255846c4f17353dbaf9e4aae2c98b8bf5b8432e215f33691805b390178434ab0e905cb0661f6cbb77ed708797dcf7e70762552262934d63632c512983a92080cee86e7210dd50b75ef20168876aea75a63d4ac3dc2480cc612deaafced5c88a5b5dda55886e87fd21981b2cbcbfc5a446fb8eadfd2a340b7cb08ab5f011803a706aab5d23c2892a3afda6560b7d6269c336f09c920a9cca336f7d52ccaa2cd1d5da401e8f63a3716248102fecd6278e7e92b9ac17b787dc0a2b239c2440730350e89afbc0d8c042cc534a7284f1bd0c90a5926f04f7cd8d439369cc48ae5d8fd94b44c2f1a537fb9092be1700ca925c86bcb26bdfb225fc08a8671b3eeda188192749b12022dcbef850666ff2c83277247d5f6aa9b847f2dc41b4fde4e010d64838f3ed9780d98216af0a81fa9d361791b8e36d38e0411821a162c4d521f34ab409ebb087d3d941c9a9b413b2ecc0fb6c90e2b869e94e04467b23154df699b0d9bbd92e3f83b9fbffcf490be7fd458d1f191f4e50c6ca46fcf6d10a927f9031c77fb182d124e8c7105d706b8af40b890196df1f1460931621dfa9689d47de7f9b4f60b4fe4059af64e70a1ba857d47ce597cabe50de054b3cbc1c9f6289b48c32cbead950488cd843f15575b2476e97e9072775cade7adeabf59b6563358fc5af24e9e66013881c12f760f1bdd98e1ca0f45fa637d412c1a9127875983ec6f01fec2f40738f06ff9eb3ca0d16486a3cdb04b06f213fb9d3c17ffb2524a2d1069969f385deeefb962570e1f77c9bc9ecaff1e2ea91cdebff5ee36d1e5e124bdbb02fd2ac1f42f98aa429c671fc1b3fdd69ebda9a2989de5930c6b110ec13c42250f1fd31d09f2609fe2a2606ded8828e691ce9fa8e72edd200b35f60901ba8531e7bca856dbc8242336c7e69e68a6697931da113161f884bf46287f415aa74da726f09f0fd6518f108234830d288bc84bde6133cd97f0cbbdd4f96d9f070e130dabfed522cd8dc27e357e8d85f282dfa88c078e70384540888cea646873281de0295644b385309b4db524ca7e2c69e53fc9fc07cf1fdddbc8c8f4a2c9ce9aa63f7e013ef0adb457509ba42654bc0cc4482d89947f7fb6c102ac150ee4d8a4cbb2575007148e18285260bf27f17e1af62ac2bd8f77dab7c3e298e3c2aa6da2aa338f4b4d48fc8c97b911dfa6ee8f16ed198629ab15f453e01320c45045f9da35905b39cfabc0547d6a99635a4d91e8ae99faf5ba6ea1791034ab3280be6efafcac75c0a817b68f503820b3459fec7333a0c02e80266afd5a4e39631538adad41ba17fcd28e6ef6051f5a9753ae0d5a5e06a552872d94c695f6d2c3895276b399640971452c0937b0c8a265a7ed636fd0149f90e3d18f71fd81eb5627a57ef59f57939434a0ceb4c6466f939303a93bc8275e1b479accc692a9485baeaefc04639a25c54bfbc4bac42a396aaf283706690fbc19f63ce102682312659a4ee004cfe106cb1e98f83d3af017f360236bb2236c24cebca4fc2bf2e7ac27056b4a6a75e869512380a05c88f368980f90334f7ca97989beca8a28a738d0a9293acafe18ebec8a30e416544dcb5fd1a5b4dcada7f5db522be3a75d80856a5bb5946aa25245293353995e6aeb7732caba5a6b0db5ebcaa469b4f666753e7ef29936c49a3e46adfae0844603a79ceaa082d6ec9b83e067b1af6b2c5499117a6ba624da5f8f6d16787f8110055688a9432176eaafaa2b22a92a3c5ae667cbfea87eb9a7f8a1c7c137f7bfa9a3953449c1e4904bd87ed121b4d5a6a943740c7eeee4edbae6d2ff27ed1b2dec4bd724ddcb68c72ab45041fb6992e3fc9068a913a709b6265a04050e914cc3caa380ada1afeb8cd1cfad4bf8854b56de48c5b7ea8c5bd35b79a24cb2698231d59779b80c769521c53f9a3fe47110436e7c2541e80b61ce3ae98efabaa87a5c7ee18942dcf6fde5378f36367570f9a09ae756f9e05eb67e59a85fff55d266aa0bcfbff144825d23bf60dd14f2b8bb3e41224d846b056527fd0531352717ed66418e1f970e15d1284db1b3b4705900d4d83626d8613af68ca1123bdf1a376d6fcf99bf3284d4b9380d88f97a62d0e7210a2039f1cb29f19061d74c2ffbcab0d0cbab1e887f44386b2ceb9971e6516e62bcf3f1de975efa924d9d8286cdf433349cbe52ce93c28ce23808fd7851bf0abfe48232b9e8672ddf8ab42859b340959c2bad690b1ecb946d26066ea3a5e272dc35c8256bf3c9556a82611740e03d360a0b949f355b7d80050f23a0f0680a044ef87830b203ab15813628c9cff5307ce4fe22a65ebc9723a8d493e94b04a0e55b6ed704aba87745edea07703d019409e1edc5d77eed408222307d0474ce027762d5fea76c2849eda79e2559366626495b8ada15b62c7a95986779bebabee5d2679ee8c6e04037509c16569da03ea13d2739260176aa06efc32a59180721461b04cd402f298e4a7913ea6fce22bdc67a458be5a77cbc85745c9e17c316c4658fa73730e98d7b187b0d055b22476cd6e5a4666490dc7f2a25d73dc17dfa486d5f6f8925dfdd3a49f76741b77613f0d1302ab53b1adbfd19de087f34ef4af2dd8ce082836957a38d854c65c7ce3febada21c8fdafc6f2dd869a143013238f5b5d3ef5d7fa10e24306b3afbe212c8dd8327f08adfad1e8d6c623045866ac5298824698556dbba05b65d59f2e8a8e7dc5174bffeef74a64b940417ad975368c25ceae83ab38db20b4923dd9bd2c9b6ee40445cfa4fb6b3d2bd7ba2d728553db78669a7d7b01c0dc18e38d071f664796339324", @generic="b93e73e1c882b5c9d03112851c80e801fe1d56085496b8a486de997e016d47d4163abeb7e2884b774c0db68f4cb67d97a027221ad7161df4cfa2ea1dbc13546d7f7a35c30b8beb91fa2907dabbdea8d3cf20765a6d6f969a09821a5dd1ef9485854a1e37204e03b31d8e4e7f23a5aff3cd5f5eeaa3fefcb54db15b3ae488b910bd8a"]}, 0x109c}, {&(0x7f0000001340)={0x1214, 0x1f, 0x400, 0x70bd25, 0x25dfdbfe, "", [@typed={0x8, 0x17, 0x0, 0x0, @ipv4=@empty}, @typed={0x8, 0x36, 0x0, 0x0, @pid}, @generic="4933025a67583721836878bdc51a2ad384e2474b7896a9e6d665fa744f03ec1b03f4bce2d20304885c13a8a0ff3035b877edecf6457d91be5a29c35930cf9236459b0f7b9decd6bd2b9f121e980304ea269b72584b5f293e0ffcd2", @generic="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", @typed={0x8, 0x54, 0x0, 0x0, @u32=0x5}, @typed={0x8, 0x31, 0x0, 0x0, @fd=r1}, @typed={0x6, 0x29, 0x0, 0x0, @str='{\x00'}, @nested={0x180, 0x1f, 0x0, 0x1, [@generic="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", @typed={0x76, 0x37, 0x0, 0x0, @binary="fd93b8651c10720c9a47c98e0ee9386f31ccd03240420945300ebc7eb24b64d943e5a5f778e91ef084a8635a9260101d2f0a20b812f8d8813fc39053356ec97b6d66e63551cc56834949aff90bf11205cf7b635ac690349118f7dd3c19afc6f844f1a67281dcc1823bc71cdf35e679d5622c"}, @generic, @typed={0x8, 0x41, 0x0, 0x0, @uid}]}]}, 0x1214}, {&(0x7f00000025c0)={0x30, 0x22, 0x20, 0x70bd29, 0x25dfdbfe, "", [@typed={0x8, 0x42, 0x0, 0x0, @uid}, @typed={0x8, 0x94, 0x0, 0x0, @pid}, @generic="15cc52c9cd19bc9567ba2c1a7f3e36d8"]}, 0x30}, {&(0x7f0000002600)={0x2f4, 0x22, 0x100, 0x10000, 0x25dfdbfb, "", [@nested={0x15a, 0x10, 0x0, 0x1, [@generic="fe0eda0f5c26b535ef2846c7be5c55523e798199a3da5791f7a8a0b9e84128d9067c8e36a204d190cae110b349a5795a3c88ed4c698482d8a4f445a4288d2b066fc933b22afbc744dd5b0303", @typed={0x4, 0x2d}, @generic="2fab4e312b8e350ec3113dd097d8d178d699562d7ca897a0552d6f54a37ee0317e43a107e1918bc8d329ac2a059bd2b50da1ab826d85e73a8ad081eaa0f8be49396446669fe7bbe1abd0212cd9bf1ca22bea620775", @typed={0x14, 0x5b, 0x0, 0x0, @ipv6=@remote}, @typed={0x8, 0x86, 0x0, 0x0, @u32=0x6d09}, @typed={0x8, 0xd, 0x0, 0x0, @fd}, @generic="053748f4b57ded516f06d86c7dc487b2419e089f2123e3f9b3fd96b37545c8bdc093c16c6d7ca3b948e58400fc4bd79eac2966f86a82ac3a2581cfe557231c9631c06479754fb30341ce708f2f98cd1d10a7ea5f4f0f02aa", @generic="d7ab4beedaabe1e1ace5ec54ebcabf6f40d7e4ab7c7aed01dc6d752d2d09dde79e55b241223795e16b08bba894f372d5ee396f4c23"]}, @typed={0xc, 0x92, 0x0, 0x0, @u64=0x4}, @nested={0x17c, 0x93, 0x0, 0x1, [@typed={0x8, 0xd, 0x0, 0x0, @ipv4=@rand_addr=0x64010102}, @typed={0xc, 0x1, 0x0, 0x0, @u64=0x5}, @generic="41b088e2c861580c66d1b23233d7c0bb730bb558e325493349566776b512d5f639169638e7729ad804512fee6ab0a4cb98cd018d54da52e08abd7c643cfea4fb103708f622102eea2c954c11a059ca8429a804d85e480e9ee1ef13c71642a45dd366fc1a31a7b6ff097d0bb43ec845a688d1429495ff6fc89ce0c7a59639555e593af71aa3bcd92c22e19286a5bc011a3f1188a2fce7ea85832cf431e2e1a41b0d18480ad3879748853da6669e174327625d2e6b150ec3b188db509654944bca84d80353d716500e52b43a3e8962bee4d67ea4bfee91", @generic="a420a33ada83c83ed3c65397f6af7d99db4077e35df2151572cf9392a130c9964de78cbfa9e33dfc954be4ecc6670cf7db9f321cc4c215429c45dbe85bf69c1c9fdf6f48205c02c8cd9eebbfc45890eaae5eeed3251160d45f79b88f981728508a81f9d56bfd3cc64048d13aa0234fd9932e9989c53d925fde0122278f462de392daa363ddc733bf026433f6b3cf"]}]}, 0x2f4}, {&(0x7f0000002900)={0x88, 0x2e, 0x100, 0x70bd26, 0x25dfdbff, "", [@generic="0c38ccdcde2d0bdc468b67207b2857f0a994d424ad5c233d230b3c9f929b60ca4beab4c5a34e1197b1d191ef578793935ddc52900510aeaa0e9853ece5f41bd4a5718157b80dc01a37dc452147a680a620d14be673c10ef3d828061d2468c2187c7ecb841b8768b593bf9113063787614557ba65e53a60"]}, 0x88}, {&(0x7f00000029c0)={0x2b4, 0x3d, 0x4, 0x70bd2b, 0x25dfdbff, "", [@nested={0x20b, 0x23, 0x0, 0x1, [@generic="54c833cc061093fd1a2bf8be0a0d6f639e", @generic="69d3f2b77a8246bb1341f3441eee6486c5a1556e4ac9bc6880f9489b7e43e8c0c9837f9bacff96c50e7a24983a3e745b475840e7193808be37e04c79471e958aa2be0dbb1c1205552d91289c208781fc36e9caf9fa29f37175cb81da3e42e43dae774f6554ec3dbb342def3285cc41fb6985ad307c50de1300f76901227793cb0338a65790119f111b1ad6ab987feca32d525cad91fb9c4a08bbac1766fa11528001fb73c86238a77707e88e01207c7a25ee08a9ecef0cae61ad293694", @typed={0xc, 0x8e, 0x0, 0x0, @u64=0x1}, @generic="afb6e7332bc860cb6ec4b26d6a99c4fcf80156a7d00755b682884f1d6e9efecdb6ca73f764d26ca4e2ec2be34c50288e8763fcbf1097f56b70a26700857910b7c44f0a03bb4ec769d27abd253040b43a49738c0861652569ef8444bc5edd1a89c3a825791bb74bdf050e2ed7266107dc5f1b0cb1d1d2c797f7925df1ac4da6974d193bd6350ca694fe2b998f656361cf5237d60d19d28e578cfa3a0813391c4307643dbd7c48e7c7e01f11f422f1873175f21d548fd2c5d2ac", @typed={0x6b, 0x22, 0x0, 0x0, @binary="2df7d38095eba28f2a0861fc1b46c2c9259d336926e6e8b7f3ad867872fb29526472f60ccc24630ccb242bb819b78a687438d9c17305fc3acd45538f8dea9f3ee21aa2593cfce257b7aa550c9c9bdb4e006dd24dc57dc02e84d1a0411a48fd287628270169fc11"}, @typed={0x8, 0x2, 0x0, 0x0, @ipv4=@private=0xa010102}]}, @nested={0x95, 0x3b, 0x0, 0x1, [@generic="37263788f41bd21029e6de79a03541a9dca924564e0e0c3d87d4f66ba43f69419ff7fd2f6591402cef95d4e26fae0acbfccb86a10401c08f957e6300210cf250b75261a8401fddad53c7e895f38c4458e38ff6d88643d6865721dc0d8ae4d8697cdeacd55b43a92f6165e379cd33046ec8da84098dd7fc4b8e96fed59e4ba16c7a324d0112be88c216", @typed={0x8, 0x47, 0x0, 0x0, @fd}]}]}, 0x2b4}, {&(0x7f0000002c80)={0x158, 0x1f, 0x10, 0x70bd26, 0x25dfdbfc, "", [@typed={0x4, 0x4b}, @generic="be9f226bff7e68f84b39b4d1a28fdff0a6587b11f7cfaf44280f32295bd64cc3a637718ef3df0ec2aa886b85699aad04aa5eb6464e5b7f864b2ccc9c1fae5e9c68f5c560ec17b965859b7cdfc18a86e4ee4f1e9520c6046344eb745524", @generic="d83ceaddc52174968862a44941d905a8ae9763c83b4eb449a8a7e17545726f081ff7173abb65a4ca499930f8bb098702ae7b7dec7f6e265a903e75340c93b36d609274cd72b3809695d87d8d134b526c1bd11ed1abc2db3e47d8d60da18a271a6af3ffd11f2c3042dd081248a2520d6907ee4106986be24fdcc0228cec40bdb012092b21a4ac10146eb33867d990dc2c4c2e1aeea048bdea0cbb5f40fde4bfb434b1d48a3b6e154519826c2901cb89c7bbd8d8e88c93f503cf1519e9cbe38665921d4f6d7b60a1b8179236cee3bde3e6c12c3560dae8d2f44a77881631c6f2", @typed={0x8, 0x73, 0x0, 0x0, @ipv4=@initdev={0xac, 0x1e, 0x1, 0x0}}]}, 0x158}, {&(0x7f0000002e00)={0x58, 0x2f, 0x400, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x4, 0x8c}, @generic="e2e286899281", @typed={0x8, 0x4f, 0x0, 0x0, @fd=r0}, @generic="31036944aa42a89999c268a74b1f80b6afe01b8cbe3a47b95944aa58c7828c267215c7e479", @typed={0xd, 0x3f, 0x0, 0x0, @str='\'![-%-@+\x00'}]}, 0x58}, {&(0x7f0000002e80)={0x12a8, 0x13, 0x1, 0x70bd2d, 0x25dfdbfb, "", [@typed={0x69, 0x9, 0x0, 0x0, @binary="ef6aa6c61abcbfbccde837b29bd426def1d3338b237e68f3d5ec53c7e66339d612045ad5ffe6d4450adc7f474c2a52f85df4bf7ac89e9842d04d6e9c3abf2a0f1888746e8f6a9ebfc85d4e9c5e8f935ee3b464ef90a4e10168db4484717a05462eadf8c930"}, @nested={0x100c, 0xc, 0x0, 0x1, [@generic="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", @typed={0x8, 0x5c, 0x0, 0x0, @ipv4=@empty}]}, @nested={0x136, 0x6d, 0x0, 0x1, [@generic="740f9e65620291488bd2c803d31d3048907818be16892160f6f7fcc69f242f28c757c5ba3b9a47dd3dd6df60bc4def9302a084c2462d22c2400a335fe00ea9002143d5bb896d36144d889705136b067025fc4bfdea748fe65f9e60ce89527fbac523cae3d9175244dda95f92e5edebedd52553596cd50942f8ef6a3a13a4aa0debee64ed7f51d4da1f31b884769b854e767bc8a2f0d773265955b9671bb656e898191e3e1e6076a023174f2a41addea18689a5afc1b8de03813f663752a36d87874cf1a13ea621a0829c4d65acfda2781bd56516c6e889011fc699f550dc7abf", @typed={0x8, 0x8f, 0x0, 0x0, @u32=0x6}, @typed={0x5, 0x58, 0x0, 0x0, @str='\x00'}, @generic="d8ebbd305853981aac56b48ddca2db8af19c5ff0f6b72e5a1ad457a41ae47aeeebccd88e46a1a14d8cb90563c7f005518a22f6072e8a554fb0b88522fd90b161c217"]}, @typed={0x8, 0x1a, 0x0, 0x0, @pid}, @generic="3ffb251ea5fe5365c85fbcb17e4816cd8360043fd6d1e218260e19a367b8c8bda66c1fbb97c2f0965754ce680dfb43629bb8d3288118637c6d0b6bdf340ceb3dae2abd115a45c353a9a8530364cff06843917ac2f0a42e3efa4f3ae99bfbfc8efc9408315df7a37de9f25695b930ce990b88cf42d9574b6fe11a63bff31da8f65610905454fdf8e462f732e29de47ca9837c1d72ea76807cabe602f37a68c910d4755d35fa2961a6e4951c9043b7d1f847cf4898eb0152b184f4843a06b4410d1a7afed565fcb5a7f642c08b3e34e1f273cc0aa32c6c9f5735410d91a7"]}, 0x12a8}, {&(0x7f0000004140)={0x11c, 0x1b, 0x200, 0x70bd2c, 0x25dfdbff, "", [@nested={0x1a, 0x39, 0x0, 0x1, [@generic="0548a4a233216b590e878c9e376414dc872956b3ae45"]}, @typed={0x4, 0x31}, @nested={0xdc, 0x52, 0x0, 0x1, [@generic="9c6cdb520c9cda17fe3da2d1b38159f477391f57431f50ba5c573037e38f08f263325943e7fe579d8dd37e45903e2ce3482ee1e97aea6a2e85b76378862bea46fff44372441873bda6c7d79c44bb3a95787794447ca5870c1df6eecf578950889c05ff32ff6b1536912994e1f24c091a42a5a977ef75fce7dba9eb1a84e8175bf67b097466cf56958a8c40f9d3257621876b603faf9295d33a7cc39d31f76187253385be6d33c39914918a06c79dca597c08b6c61af59e195461d5722c06d7287a25ab976a107f725981736d19bc093edd45422451a02e47"]}, @nested={0x10, 0x4d, 0x0, 0x1, [@typed={0xc, 0x73, 0x0, 0x0, @u64=0x5}]}]}, 0x11c}], 0xa, &(0x7f0000004400)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [r4, r1]}}, @rights={{0x20, 0x1, 0x1, [r6, r1, 0xffffffffffffffff, r7]}}], 0x50}, 0x8041) creat(&(0x7f0000000080)='./file0\x00', 0x82) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r2, 0x2405, r0) perf_event_open(&(0x7f0000000180)={0x4, 0x80, 0x40, 0xf9, 0x3, 0x5, 0x0, 0x3f, 0x8, 0x3, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f00000000c0), 0x1}, 0x48000, 0xffff, 0x2, 0x1, 0xffff, 0x7, 0xd5a, 0x0, 0x1, 0x0, 0x6}, 0x0, 0xc, r0, 0x0) [ 931.171290] random: crng reseeded on system resumption 00:20:19 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x1, 0x0) sendfile(r0, r1, &(0x7f0000000080)=0x4c9, 0x8d7d) 00:20:19 executing program 1: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x8, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:20:19 executing program 2: r0 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = fcntl$getown(r0, 0x9) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x1f, 0x1f, 0x7c, 0x6, 0x0, 0x1, 0x80, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000000), 0x3}, 0x13000, 0x41, 0x0, 0x3, 0x58, 0x0, 0x8001, 0x0, 0x5, 0x0, 0x8}, r1, 0xa, r0, 0x1) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB], 0x7) 00:20:19 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:19 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:20:20 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000", 0x24}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:20 executing program 4: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r1 = fsopen(&(0x7f0000000000)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r1, 0x8, 0x0, 0x0, 0x0) fsmount(r1, 0x0, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[@ANYBLOB="040f0409401620"], 0x7) 00:20:20 executing program 1: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:20 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x0, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:20 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:20 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:20 executing program 2: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x2) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) pread64(0xffffffffffffffff, &(0x7f0000000080)=""/231, 0xe7, 0x8) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) fcntl$addseals(r1, 0x409, 0x8) syz_emit_vhci(&(0x7f0000000000)=@HCI_SCODATA_PKT={0x3, {0xc8, 0x31}, "fba33eaa671d1bd6c14243381a279342b41836f377d88440c89c1f6ce3c8b416f2685384becdf1fa43721e1473bfa1c908"}, 0x35) 00:20:31 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:31 executing program 1: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:31 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x6, 0x3, 0x1, 0x5, 0x0, 0x2, 0x1040, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x10a0, 0xc95, 0x0, 0x0, 0x1ca00000000, 0x9, 0x3, 0x0, 0x1, 0x0, 0x100000001}, 0xffffffffffffffff, 0xa, r0, 0x1) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000000280)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = fcntl$dupfd(r2, 0xc92f45d0d06d6a2, r2) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x6, 0x40, 0x35, 0x1, 0x0, 0x80000000, 0x3228a, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xa0000000, 0x4, @perf_config_ext={0x8}, 0x1000, 0x2, 0x6, 0x1, 0x7, 0x5, 0x4, 0x0, 0xffffffff, 0x0, 0x3}, 0xffffffffffffffff, 0x2, r2, 0x2) 00:20:31 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:31 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000000)=ANY=[], 0x7) r0 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f0000000040)) 00:20:31 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:31 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000", 0x24}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:31 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:31 executing program 2: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB="040f0409401620"], 0x7) fcntl$getownex(r0, 0x10, &(0x7f0000000000)={0x0, 0x0}) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc2, 0x3f, 0x2, 0x8, 0x0, 0x0, 0x81000, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext={0x9, 0x8}, 0x1000, 0x7, 0x20, 0x7, 0x10001, 0x9, 0x8407, 0x0, 0x3ff, 0x0, 0x80}, r1, 0xf, 0xffffffffffffffff, 0xa) syz_emit_vhci(&(0x7f00000001c0)=ANY=[@ANYBLOB="0100e8492d82f17c"], 0x8) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0x42, 0x0, 0x3, 0x20, 0x0, 0x400000000004, 0x400, 0xb, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3f, 0x0, @perf_bp={&(0x7f0000000180), 0x1}, 0xc000, 0x6, 0x100, 0x7, 0x7edc, 0x6, 0x8, 0x0, 0xfffffe01, 0x0, 0x8}, 0x0, 0xa, r0, 0x1) 00:20:31 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_io_uring_setup(0x15b3, &(0x7f0000000140)={0x0, 0x7d02, 0x8, 0x1, 0x180}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffd000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000200)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:20:42 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:42 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000", 0x24}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:42 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x6, 0x3, 0x1, 0x5, 0x0, 0x2, 0x1040, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x10a0, 0xc95, 0x0, 0x0, 0x1ca00000000, 0x9, 0x3, 0x0, 0x1, 0x0, 0x100000001}, 0xffffffffffffffff, 0xa, r0, 0x1) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000000280)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = fcntl$dupfd(r2, 0xc92f45d0d06d6a2, r2) fcntl$dupfd(r3, 0x0, 0xffffffffffffffff) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x6, 0x40, 0x35, 0x1, 0x0, 0x80000000, 0x3228a, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0xa0000000, 0x4, @perf_config_ext={0x8}, 0x1000, 0x2, 0x6, 0x1, 0x7, 0x5, 0x4, 0x0, 0xffffffff, 0x0, 0x3}, 0xffffffffffffffff, 0x2, r2, 0x2) 00:20:42 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:42 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) (fail_nth: 1) 00:20:42 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:20:42 executing program 2: perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xfb, 0x7f, 0x9, 0x5, 0x0, 0xfffffffffffffffc, 0x8048, 0x8, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x0, @perf_config_ext={0xdf7}, 0x418, 0x0, 0xc0f, 0x1, 0x40, 0x5, 0x34, 0x0, 0x2b1, 0x0, 0x7}, r0, 0x10, 0xffffffffffffffff, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) io_submit(0x0, 0x2, &(0x7f00000002c0)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x7, r2, &(0x7f00000001c0)="d3d795b13735d3dfb3557208d3fe5780156a", 0x12, 0xfff, 0x0, 0x3, r1}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x6, 0x401, r4, &(0x7f0000000240)="98401570b61ebde00f987c32aacbc278aa5e7ecb", 0x14, 0x929, 0x0, 0x3}]) syz_emit_vhci(&(0x7f0000000040)=ANY=[@ANYBLOB], 0x7) [ 953.482181] FAULT_INJECTION: forcing a failure. [ 953.482181] name failslab, interval 1, probability 0, space 0, times 0 [ 953.484486] CPU: 0 UID: 0 PID: 51418 Comm: syz-executor.1 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 953.484527] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.484540] Call Trace: [ 953.484548] [ 953.484557] dump_stack_lvl+0xfa/0x120 [ 953.484589] should_fail_ex+0x4d7/0x5e0 [ 953.484623] should_failslab+0xc2/0x120 [ 953.484656] __kvmalloc_node_noprof+0x11f/0x770 [ 953.484687] ? seq_read_iter+0x82f/0x1320 [ 953.484708] ? __pfx__kstrtoull+0x10/0x10 [ 953.484750] ? seq_read_iter+0x82f/0x1320 [ 953.484770] seq_read_iter+0x82f/0x1320 [ 953.484811] seq_read+0x375/0x540 [ 953.484834] ? __pfx_seq_read+0x10/0x10 [ 953.484858] ? get_pid_task+0x29/0x250 [ 953.484890] ? get_pid_task+0xfd/0x250 [ 953.484918] ? lock_release+0xc8/0x290 [ 953.484957] ? avc_policy_seqno+0x9/0x20 [ 953.484989] ? selinux_file_permission+0x99/0x600 [ 953.485023] ? __pfx_seq_read+0x10/0x10 [ 953.485046] proc_reg_read+0x22e/0x310 [ 953.485069] ? __pfx_proc_reg_read+0x10/0x10 [ 953.485093] vfs_read+0x1eb/0xc70 [ 953.485126] ? lock_acquire+0x15e/0x2f0 [ 953.485157] ? __fget_files+0x34/0x3b0 [ 953.485184] ? __pfx_vfs_read+0x10/0x10 [ 953.485211] ? __fget_files+0x203/0x3b0 [ 953.485236] ? lock_release+0xc8/0x290 [ 953.485274] ? __fget_files+0x20d/0x3b0 [ 953.485314] __x64_sys_pread64+0x1f1/0x260 [ 953.485345] ? __pfx___x64_sys_pread64+0x10/0x10 [ 953.485388] do_syscall_64+0xbf/0x390 [ 953.485420] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 953.485445] RIP: 0033:0x7f53ea06ab19 [ 953.485464] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.485487] RSP: 002b:00007f53e75e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 953.485510] RAX: ffffffffffffffda RBX: 00007f53ea17df60 RCX: 00007f53ea06ab19 [ 953.485526] RDX: 0000000000000087 RSI: 0000000020001200 RDI: 0000000000000004 [ 953.485541] RBP: 00007f53e75e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.485555] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 953.485569] R13: 00007ffc08b2d24f R14: 00007f53e75e0300 R15: 0000000000022000 [ 953.485606] 00:20:42 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmsg$netlink(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)={0x104, 0x3c, 0x8, 0x70bd26, 0x25dfdbfb, "", [@generic="ac665dc75e70b9a07ec544d5", @typed={0x9, 0x92, 0x0, 0x0, @str='/.%^\x00'}, @nested={0xdc, 0x34, 0x0, 0x1, [@typed={0x14, 0x72, 0x0, 0x0, @ipv6=@mcast1}, @generic="e4e6a07c7fe0f37ae4cb32aeedb9bac6803438c1ae4fc0b8bcdefe8386c3b0bbfbdda1bdbe5e0f884b0e27a1fa9d4f830bab32d743fffa8127d34460f128707a3a569d5843f52a803f3c5931965acb76ab8e8b2d24143117e2593c91ff4568e0eb6e5c3574", @generic="20e2f2c64daee878b6d00c89cf943d067c86e3937c86e950700f0c550c5183fe88aa1d05159e6563a0e3e340101d50c3cf1424ad2bab3bbbb6e90ce74c80eb5f7fcf24c175953cb304464d489e7cb0f8c8b16414bab6bae2b5c85405846036"]}]}, 0x104}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0101e86e8144b00414673b3dc5610000"], 0x18, 0x40000}, 0x4014) 00:20:42 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r1 = socket$inet_udp(0x2, 0x2, 0x0) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = gettid() r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) sendmsg$netlink(r0, &(0x7f0000000180)={&(0x7f0000000000)=@proc={0x10, 0x0, 0x25dfdbff, 0x4000}, 0xc, &(0x7f0000000040)=[{&(0x7f00000003c0)={0x3b0, 0x1b, 0x200, 0x70bd28, 0x25dfdbff, "", [@typed={0xae, 0x5, 0x0, 0x0, @binary="dec545416ef9be2277c09f1d707a4d3b7a751e4c36d514e831bba81c90ed05eb2a4d26c58ff786d50f1cbadb0ab52d5ee2c0356fb6c77c6643de7fcb7e60ea6d1ac313a3337b13e5c19b8d4a2985fcb402e8fe10fa8ae69de27a9ae2414e2a8009dc544eb743d464190ffd11cb986fa826edb468cbf26a8c1ca0d7db4db8fa6683e4d3e25530beae9febeb54d2dbed175868a51b994d69f2784c08fc8ff229cdde24f3b0e38db68c1d76"}, @nested={0x1ff, 0x4e, 0x0, 0x1, [@generic="33f14e82744652ef541722baa76327707cb1781380a8b9075022d649a4055448c86c4e8def316679bdbc3c2bbd6b", @generic="20534722f2b5f5b6bb9f361bb1c0ceea4c99e7c3cf5946dc1b513b12490b29537a195a0a8ffeaf94e3e83e5c19f6b1c0a15f4fda1afa2e8219c646b4f0230ae71f7b98c9b8208a185920872060e4125596f0ed9fc3ff62214ab539dc6b99cfea13e5bf6eada6864aef31b37be1da8724eeb0f689f23d29f7b3bab5c552c6ca476bdb276d50", @typed={0x8, 0x43, 0x0, 0x0, @ipv4=@empty}, @generic="8ee775ac41e3760ad9cab4489e1140d94b9eefad8faa47dd025604cc867115fc21cf0d2b460f0975748ce69029f7924428bf483be012287ffd9cdbe648260f4ff55af245bf440001b5a605922c950aed7d0003310ffbba5b1826e48349e715bd23d9ce7f3813e54a30642b8be5fb72d785315ba29cb104781be1598a7ce01166dab4cd0022fe12813959c30c8bfa1b3985ea72d147407579a9ed98def10a5c9f7cd6676e47c33fb96ff5a4389cb308b638edf3", @typed={0x14, 0xb, 0x0, 0x0, @ipv6=@private1={0xfc, 0x1, '\x00', 0x1}}, @generic="33db9f4b4e23a9988a501c5ad18a717b837ecf8f9d34f3e7f444ad532a3c80f8f89e3bec70fe108a5fccc8a3e681fbe35b3570c751bb7616546ea59df6814257feca67cee674c3562c73be4abae8599532a9897e5a9d5f422328a38f08798fa12e52832617e41fe007b52dacecef0f6f27df54789c207c0e00"]}, @typed={0x9, 0x4f, 0x0, 0x0, @str=')7%$\x00'}, @generic="5862cda95a46047ab75f37fe6d26c8f567cda1065e973861ba7e0fc951fc78e13e30523e21efdba73b545da39bf427d8d7699228c245688cb55b0d6f628b753e89f302e8d9a019694957058b0459832789449167450eb8be118729a3391db2abaf0cb88ff37f863ea3e9c0766ac8510c5756ddfa95a2ec49c5ccc3621ba86a85b3db8b2fa4dcb3c4f59cd9d91f9ce387cbdd820a6c21ee419957ee16066b2d92a325137c940a8ce202d6ce3a8072468f7074f5c6fedb9498eeeeb70692e5d6e4a1e1ad9bb554b844a91868f72c0123a93155dc1e70e300b38fdf490c18550d1694c2"]}, 0x3b0}], 0x1, &(0x7f00000000c0)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x28, 0x1, 0x1, [r0, r0, r1, r3, r0, r5]}}], 0x60, 0x2000c011}, 0x20000800) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000000140)=ANY=[@ANYBLOB="280000001200ffff0000000000000000b6fd3e801400008008006200", @ANYRES32=0xee00, @ANYBLOB="08d700"], 0x28}], 0x1}, 0x0) 00:20:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) (fail_nth: 2) 00:20:42 executing program 2: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x6002, 0x0) r2 = openat$full(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) pwrite64(r0, &(0x7f00000000c0)="d1", 0x1, 0xa3e6) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0xa0103) 00:20:42 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) [ 953.866413] netlink: 8 bytes leftover after parsing attributes in process `syz-executor.3'. 00:20:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) (fail_nth: 3) 00:20:42 executing program 7: ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000001c0)={0x0, 0x0}) r1 = open(&(0x7f0000000240)='./file0\x00', 0x101000, 0x40) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x1, 0x1f, 0x2, 0xc0, 0x0, 0x59c2, 0x48000, 0xe, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x25ee18d3, 0x4, @perf_config_ext={0xaef, 0x800}, 0xc, 0x6, 0x101, 0x9, 0x100, 0xffffffff, 0x3f, 0x0, 0xeb67, 0x0, 0x2}, r0, 0xc, r1, 0x8) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) fcntl$setstatus(r2, 0x4, 0x44000) io_setup(0xfff, &(0x7f0000000040)=0x0) write$binfmt_script(r2, &(0x7f0000000100)=ANY=[], 0x8b) io_submit(r3, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f00000000c0)="d3", 0x1}]) r4 = gettid() r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r6 = signalfd4(0xffffffffffffffff, &(0x7f0000000040)={[0x80000001]}, 0x8, 0x800) io_submit(r3, 0x2, &(0x7f0000000480)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x6, r5, &(0x7f0000000280)="3b40dbe9c00fb2061626510857a404e386888743353a8141c0bda784140918e19c8d6ff443ce54317477ff22edf1c5715ce94d920d8ec5b93db10e0ecdd99be60d06722cfbf460c736fd06d3f13f978e4464667451e20e407dc8c8c80d0bff551e20a217d47cf28bde00d1b36efae72074b7a1ba52cddd56181e3bb636bb2c18d0218dc63630da7efcde6f52cb8cefc7099b7adcf816db4ff3870c0b40326051", 0xa0, 0xfffffffffffffffd, 0x0, 0x1}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x3, 0x5, r6, &(0x7f0000000340)="83f02eb9c3d2c30c35fc0f8c3eea60403708a44bebe2fd0d7acf1068f519ad8fd648a00855e02b983c034529926782e6bbd5b297316f6268d211a5cfc993e49c457c94d1c4730c121c3311b04c92a700d37e0834b00360e5c75cc5ecb3f70c9d35a9ee139aaeef9b3cfe46dc972184870a1e4f7b02ba05dd239e15e7647a0bdf2ee8b7cb3949c3b7367feeb5b97f6a53f3dca919a4eae3135e0f789ffe7f965e1bf581ff02e2926767f5d6f65ad0b78db5af5cce3b9afabb922ed9685b02790484d66a29c9f6cae9a40e45b37ec01ace4e8ea6587ceac7", 0xd7, 0x4, 0x0, 0x0, r1}]) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x7fff, 0x0, 0x0, 0x20, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) [ 953.982251] FAULT_INJECTION: forcing a failure. [ 953.982251] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 953.983459] CPU: 1 UID: 0 PID: 52172 Comm: syz-executor.1 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 953.983478] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 953.983485] Call Trace: [ 953.983490] [ 953.983496] dump_stack_lvl+0xfa/0x120 [ 953.983521] should_fail_ex+0x4d7/0x5e0 [ 953.983541] _copy_to_iter+0x578/0x1660 [ 953.983564] ? __pfx__copy_to_iter+0x10/0x10 [ 953.983579] ? lock_release+0xc8/0x290 [ 953.983602] ? __virt_addr_valid+0x100/0x5d0 [ 953.983619] ? __check_object_size+0x57b/0x880 [ 953.983638] seq_read_iter+0xdd2/0x1320 [ 953.983663] seq_read+0x375/0x540 [ 953.983675] ? __pfx_seq_read+0x10/0x10 [ 953.983689] ? get_pid_task+0x29/0x250 [ 953.983708] ? get_pid_task+0xfd/0x250 [ 953.983723] ? lock_release+0xc8/0x290 [ 953.983745] ? avc_policy_seqno+0x9/0x20 [ 953.983764] ? selinux_file_permission+0x99/0x600 [ 953.983784] ? __pfx_seq_read+0x10/0x10 [ 953.983797] proc_reg_read+0x22e/0x310 [ 953.983811] ? __pfx_proc_reg_read+0x10/0x10 [ 953.983824] vfs_read+0x1eb/0xc70 [ 953.983842] ? lock_acquire+0x15e/0x2f0 [ 953.983860] ? __fget_files+0x34/0x3b0 [ 953.983876] ? __pfx_vfs_read+0x10/0x10 [ 953.983891] ? __fget_files+0x203/0x3b0 [ 953.983905] ? lock_release+0xc8/0x290 [ 953.983927] ? __fget_files+0x20d/0x3b0 [ 953.983950] __x64_sys_pread64+0x1f1/0x260 [ 953.983967] ? __pfx___x64_sys_pread64+0x10/0x10 [ 953.983992] do_syscall_64+0xbf/0x390 [ 953.984011] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 953.984026] RIP: 0033:0x7f53ea06ab19 [ 953.984040] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 953.984053] RSP: 002b:00007f53e75e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 953.984067] RAX: ffffffffffffffda RBX: 00007f53ea17df60 RCX: 00007f53ea06ab19 [ 953.984076] RDX: 0000000000000087 RSI: 0000000020001200 RDI: 0000000000000004 [ 953.984085] RBP: 00007f53e75e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 953.984093] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 953.984101] R13: 00007ffc08b2d24f R14: 00007f53e75e0300 R15: 0000000000022000 [ 953.984122] 00:20:42 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:42 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r1 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) sendmsg$netlink(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000000280)=[{&(0x7f0000000140)={0x104, 0x3c, 0x8, 0x70bd26, 0x25dfdbfb, "", [@generic="ac665dc75e70b9a07ec544d5", @typed={0x9, 0x92, 0x0, 0x0, @str='/.%^\x00'}, @nested={0xdc, 0x34, 0x0, 0x1, [@typed={0x14, 0x72, 0x0, 0x0, @ipv6=@mcast1}, @generic="e4e6a07c7fe0f37ae4cb32aeedb9bac6803438c1ae4fc0b8bcdefe8386c3b0bbfbdda1bdbe5e0f884b0e27a1fa9d4f830bab32d743fffa8127d34460f128707a3a569d5843f52a803f3c5931965acb76ab8e8b2d24143117e2593c91ff4568e0eb6e5c3574", @generic="20e2f2c64daee878b6d00c89cf943d067c86e3937c86e950700f0c550c5183fe88aa1d05159e6563a0e3e340101d50c3cf1424ad2bab3bbbb6e90ce74c80eb5f7fcf24c175953cb304464d489e7cb0f8c8b16414bab6bae2b5c85405846036"]}]}, 0x104}], 0x1, &(0x7f0000000340)=ANY=[@ANYBLOB="14000000000000000100000001000000", @ANYRES32=r1, @ANYBLOB="0101e86e8144b00414673b3dc5610000"], 0x18, 0x40000}, 0x4014) 00:20:42 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f80000200040000300000000000000", 0x24}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:42 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:42 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:42 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) (fail_nth: 4) 00:20:42 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) [ 954.340658] FAULT_INJECTION: forcing a failure. [ 954.340658] name fail_page_alloc, interval 1, probability 0, space 0, times 1 [ 954.342741] CPU: 0 UID: 0 PID: 52576 Comm: syz-executor.1 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 954.342770] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 954.342782] Call Trace: [ 954.342789] [ 954.342797] dump_stack_lvl+0xfa/0x120 [ 954.342827] should_fail_ex+0x4d7/0x5e0 [ 954.342858] should_fail_alloc_page+0xe0/0x110 [ 954.342889] prepare_alloc_pages+0x1eb/0x550 [ 954.342921] __alloc_frozen_pages_noprof+0x17f/0x1f20 [ 954.342961] ? perf_trace_lock_acquire+0xc9/0x700 [ 954.343002] ? __pfx___alloc_frozen_pages_noprof+0x10/0x10 [ 954.343044] ? perf_trace_lock_acquire+0xc9/0x700 [ 954.343075] ? perf_trace_lock_acquire+0xc9/0x700 [ 954.343111] ? __sanitizer_cov_trace_switch+0x54/0x90 [ 954.343147] ? policy_nodemask+0xeb/0x4e0 [ 954.343184] alloc_pages_mpol+0xed/0x340 [ 954.343217] ? __pfx_alloc_pages_mpol+0x10/0x10 [ 954.343251] ? ___pte_offset_map+0x33/0x390 [ 954.343275] ? get_vma_policy+0x23b/0x350 [ 954.343300] vma_alloc_folio_noprof+0xe9/0x230 [ 954.343322] ? __pfx_vma_alloc_folio_noprof+0x10/0x10 [ 954.343342] ? find_held_lock+0x2b/0x80 [ 954.343365] ? __handle_mm_fault+0x749/0x30c0 [ 954.343394] ? lock_release+0xc8/0x290 [ 954.343428] __handle_mm_fault+0x13e9/0x30c0 [ 954.343460] ? __pfx_mt_find+0x10/0x10 [ 954.343485] ? __pfx___handle_mm_fault+0x10/0x10 [ 954.343538] ? find_vma+0xbf/0x140 [ 954.343561] ? __pfx_find_vma+0x10/0x10 [ 954.343590] handle_mm_fault+0x2d8/0x750 [ 954.343620] ? lock_mm_and_find_vma+0xaa/0x6f0 [ 954.343645] do_user_addr_fault+0x50c/0x1760 [ 954.343688] exc_page_fault+0xb0/0x180 [ 954.343713] asm_exc_page_fault+0x26/0x30 [ 954.343733] RIP: 0010:rep_movs_alternative+0x54/0x90 [ 954.343765] Code: 00 00 00 00 66 90 48 8b 06 48 89 07 48 83 c6 08 48 83 c7 08 83 e9 08 74 db 83 f9 08 73 e8 eb c5 eb 05 e9 1f a4 07 00 48 8b 06 <48> 89 07 48 8d 47 08 48 83 e0 f8 48 29 f8 48 01 c7 48 01 c6 48 29 [ 954.343785] RSP: 0018:ffff88804f36f9d0 EFLAGS: 00050206 [ 954.343803] RAX: 6365526e49367049 RBX: 0000000000000087 RCX: 0000000000000087 [ 954.343817] RDX: ffffed100a62fc11 RSI: ffff88805317e000 RDI: 0000000020001200 [ 954.343831] RBP: 0000000000000087 R08: 0000000000000000 R09: ffffed100a62fc10 [ 954.343844] R10: ffff88805317e086 R11: 0000000000000000 R12: 0000000020001200 [ 954.343857] R13: ffff88804f36fbe8 R14: ffff88805317e000 R15: 0000000000000000 [ 954.343890] _copy_to_iter+0x48d/0x1660 [ 954.343926] ? __pfx__copy_to_iter+0x10/0x10 [ 954.343948] ? lock_release+0xc8/0x290 [ 954.343982] ? __virt_addr_valid+0x100/0x5d0 [ 954.344006] ? __check_object_size+0x57b/0x880 [ 954.344035] seq_read_iter+0xdd2/0x1320 [ 954.344073] seq_read+0x375/0x540 [ 954.344093] ? __pfx_seq_read+0x10/0x10 [ 954.344114] ? get_pid_task+0x29/0x250 [ 954.344143] ? get_pid_task+0xfd/0x250 [ 954.344167] ? lock_release+0xc8/0x290 [ 954.344201] ? avc_policy_seqno+0x9/0x20 [ 954.344229] ? selinux_file_permission+0x99/0x600 [ 954.344259] ? __pfx_seq_read+0x10/0x10 [ 954.344279] proc_reg_read+0x22e/0x310 [ 954.344300] ? __pfx_proc_reg_read+0x10/0x10 [ 954.344322] vfs_read+0x1eb/0xc70 [ 954.344349] ? lock_acquire+0x15e/0x2f0 [ 954.344377] ? __fget_files+0x34/0x3b0 [ 954.344400] ? __pfx_vfs_read+0x10/0x10 [ 954.344424] ? __fget_files+0x203/0x3b0 [ 954.344447] ? lock_release+0xc8/0x290 [ 954.344481] ? __fget_files+0x20d/0x3b0 [ 954.344516] __x64_sys_pread64+0x1f1/0x260 [ 954.344544] ? __pfx___x64_sys_pread64+0x10/0x10 [ 954.344582] do_syscall_64+0xbf/0x390 [ 954.344609] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 954.344631] RIP: 0033:0x7f53ea06ab19 [ 954.344646] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 954.344665] RSP: 002b:00007f53e75e0188 EFLAGS: 00000246 ORIG_RAX: 0000000000000011 [ 954.344684] RAX: ffffffffffffffda RBX: 00007f53ea17df60 RCX: 00007f53ea06ab19 [ 954.344698] RDX: 0000000000000087 RSI: 0000000020001200 RDI: 0000000000000004 [ 954.344711] RBP: 00007f53e75e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 954.344723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 954.344736] R13: 00007ffc08b2d24f R14: 00007f53e75e0300 R15: 0000000000022000 [ 954.344768] 00:20:43 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x2, 0x20}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r0, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000080), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 00:20:43 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x808}, 0x0, 0xa, 0xffffffffffffffff, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sync() [ 956.030890] kworker/u9:0 (25) used greatest stack depth: 23872 bytes left 00:20:53 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) (fail_nth: 5) 00:20:53 executing program 7: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f00000002c0)={{0x1, 0x1, 0x18, r0, @out_args}, './file0\x00'}) mkdirat(r1, &(0x7f0000000300)='./file0\x00', 0x34) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f0000000040)='./file0\x00', 0x80000000, 0x1, &(0x7f0000000200)=[{&(0x7f0000000140)="548142b5b98e7481034866707f7b6628771e81c42a43329f39da8030c37f2aacad4a9c11d3a2cc23d33e135208da58d97fc47f5e68e6d0553aa41c363fd8802fb7d67d33e312ab25b7bf23687d01302d19cf341f95f1d5a36463493bf86f9a96a441eca0f4e8e11b748d57b6bb734205ed9b55924b4a81b9f8e46546f66e69efb64296ee9e33511bfd8bcb1337d3ed9a51c2d007ec70012f757627ee68fdf48bb63259d8572d64a914757fb94c0cbbf35beb2f2574", 0xb5}], 0x1400, &(0x7f0000000240)={[{@user_xattr}, {@init_itable_val={'init_itable', 0x3d, 0x3}}, {@nodiscard}], [{@permit_directio}, {@smackfsfloor}, {@smackfshat={'smackfshat', 0x3d, 'G\xdc.#,'}}]}) 00:20:53 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:53 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:20:53 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:20:53 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:20:53 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x24280, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x808}, 0x0, 0xa, 0xffffffffffffffff, 0x2) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000000c0)={0x1, &(0x7f00000002c0)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) sync() 00:20:53 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000600)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_config_ext={0x2, 0x20}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r0, 0x0) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000080), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) [ 964.773311] FAULT_INJECTION: forcing a failure. [ 964.773311] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 964.774854] CPU: 1 UID: 0 PID: 53161 Comm: syz-executor.1 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 964.774871] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 964.774879] Call Trace: [ 964.774883] [ 964.774888] dump_stack_lvl+0xfa/0x120 [ 964.774908] should_fail_ex+0x4d7/0x5e0 [ 964.774926] _copy_to_user+0x32/0xd0 [ 964.774942] simple_read_from_buffer+0xe0/0x180 [ 964.774965] proc_fail_nth_read+0x18a/0x240 [ 964.774984] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 964.775000] ? security_file_permission+0x22/0x90 [ 964.775017] ? __pfx_proc_fail_nth_read+0x10/0x10 [ 964.775033] vfs_read+0x1eb/0xc70 [ 964.775051] ? __pfx_vfs_read+0x10/0x10 [ 964.775065] ? lock_release+0xc8/0x290 [ 964.775085] ? __fget_files+0x20d/0x3b0 [ 964.775105] ksys_read+0x121/0x240 [ 964.775118] ? __pfx_ksys_read+0x10/0x10 [ 964.775137] do_syscall_64+0xbf/0x390 [ 964.775153] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 964.775166] RIP: 0033:0x7f53ea01d69c [ 964.775176] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 964.775187] RSP: 002b:00007f53e75e0170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 964.775199] RAX: ffffffffffffffda RBX: 0000000000000087 RCX: 00007f53ea01d69c [ 964.775207] RDX: 000000000000000f RSI: 00007f53e75e01e0 RDI: 0000000000000005 [ 964.775214] RBP: 00007f53e75e01d0 R08: 0000000000000000 R09: 0000000000000000 [ 964.775221] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 964.775228] R13: 00007ffc08b2d24f R14: 00007f53e75e0300 R15: 0000000000022000 [ 964.775246] 00:21:04 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x10000, 0xc, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000200008000f800002000400000000000000000000100000000000000020000000100060000000000000000000000000080002933dd16f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x9}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000200008000f800002000400000000000000000000100000000000000020000000100060000000000000000000000000080002933dd16f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="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", 0x120, 0x4400}, {&(0x7f0000010900)="2e20202020202020202020100010e770325132510000e77032510300000000002e2e202020202020202020100010e770325132510000e770325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200010e770325132510000e770325104001a040000", 0x80, 0x5400}, {&(0x7f0000010a00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6400}, {&(0x7f0000010f00)='syzkallers\x00'/32, 0x20, 0x7400}, {&(0x7f0000011000)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb400}], 0x0, &(0x7f0000011100)) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) r2 = fork() r3 = fork() kcmp(r2, r3, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r4 = getpid() setpgid(r3, r4) r5 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000001740), 0x101400, 0x0) kcmp(r0, r4, 0x0, r5, r1) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) mkdirat(r1, &(0x7f0000001700)='./file0\x00', 0x144) mount$bind(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0xc0ab1fc233c33739, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f00000016c0)={&(0x7f0000000140), 0x6e, &(0x7f0000001600)=[{&(0x7f0000000340)=""/4096, 0x1000}, {&(0x7f0000001340)=""/167, 0xa7}, {&(0x7f0000001400)=""/132, 0x84}, {&(0x7f00000001c0)=""/17, 0x11}, {&(0x7f00000014c0)=""/114, 0x72}, {&(0x7f0000001540)=""/175, 0xaf}], 0x6, &(0x7f0000001680)=[@cred={{0x1c}}, @cred={{0x1c}}], 0x40}, 0x40000000) 00:21:04 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_print_times', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80a00, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x4840, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x8010, r0, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x201) 00:21:04 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) 00:21:04 executing program 7: ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x401) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:21:04 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:04 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:04 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x2, 0x0) 00:21:04 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:04 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x3, 0x0) 00:21:04 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:05 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:05 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_print_times', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80a00, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x4840, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x8010, r0, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x201) 00:21:05 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = getpgrp(0xffffffffffffffff) perf_event_open(&(0x7f0000000400)={0x2, 0x80, 0x4, 0x5, 0x5, 0x20, 0x0, 0x0, 0x1, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x4, @perf_bp={&(0x7f00000003c0), 0xd}, 0x8014, 0xffffffffffffffc0, 0x5, 0x0, 0x8, 0x5, 0xfff8, 0x0, 0x9, 0x0, 0x7}, r0, 0x4, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0xffffffff, 0x2, &(0x7f00000002c0)=[{&(0x7f00000001c0)="78a14e676f0450d735211c2dfe5c7b97e618349195907414217bcb211ba8059a5f19ab680043021bafe2271090cba5b10e5dd5ed3bfd204dc11d76fb6d7031a58f161820341c1918a12013b4623a1f56a14a866b24bbd251b1b893eae4aa0a4dfee01f30c5cb6ef21aaa383735ad8fa74232e592be283cd6069b9b7bbf867333e65ab0ebee", 0x85, 0xd2}, {&(0x7f0000000280)="994190cd79c3765ea322838a48434561b251614dae88857d724c0300d9e1c9a37b38fb89daa0", 0x26, 0x7}], 0x0, &(0x7f0000000300)={[{}, {}, {}, {}, {}], [{@dont_appraise}, {@smackfstransmute={'smackfstransmute', 0x3d, '\xc7\\--+-&]}'}}, {@smackfshat={'smackfshat', 0x3d, ']\xbe'}}, {@dont_hash}, {@audit}, {@mask={'mask', 0x3d, 'MAY_APPEND'}}, {@fsmagic={'fsmagic', 0x3d, 0x7}}]}) unlinkat(r1, &(0x7f0000000380)='./file1\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:21:05 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:05 executing program 3: ioctl$KDMKTONE(0xffffffffffffffff, 0x4b30, 0x401) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x2) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:21:05 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x4, 0x0) 00:21:05 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x9, 0x8001}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/pm_print_times', 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x80a00, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000000), 0x4840, 0x0) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x5, 0x8010, r0, 0x0) syz_io_uring_submit(r1, 0x0, 0x0, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) connect$inet6(r2, 0x0, 0x0) creat(&(0x7f0000000080)='./file0\x00', 0x201) 00:21:05 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:05 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwrite64(r0, &(0x7f0000000140)=' ', 0x1, 0x99ad) r1 = mmap$IORING_OFF_SQ_RING(&(0x7f0000ff9000/0x1000)=nil, 0x1000, 0x7, 0x13, r0, 0x0) sendmsg$NFT_MSG_GETTABLE(r0, &(0x7f00000001c0)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000000180)={&(0x7f0000000080)=ANY=[@ANYBLOB="5c02000000000000000000000005080002400000000008000240000000000c00044000000000000000010900010073797a30000000000900010073797a300000000008000240000000010c0004400000000000000005000000000000"], 0x5c}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000000), 0x0, 0x4) madvise(&(0x7f0000ff3000/0xd000)=nil, 0xd000, 0xb) syz_memcpy_off$IO_URING_METADATA_FLAGS(r1, 0x0, &(0x7f0000000440), 0x0, 0x4) 00:21:17 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:17 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r0) io_setup(0xfff, &(0x7f0000000040)=0x0) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x52d1, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r2 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/power/resume', 0x140241, 0x0) io_submit(r1, 0xa, &(0x7f0000000240)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x1, 0x0, r2, &(0x7f0000000000)='A', 0x1}]) io_destroy(r1) 00:21:17 executing program 2: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736642a3c400088001", 0xf}, {0x0, 0x0, 0x800}], 0x0, &(0x7f0000010f00)) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) mkdirat(r1, &(0x7f0000000040)='./file0\x00', 0x40) pread64(0xffffffffffffffff, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) kcmp(r0, r0, 0x4, 0xffffffffffffffff, r3) ioctl$AUTOFS_IOC_EXPIRE(0xffffffffffffffff, 0x810c9365, &(0x7f0000000240)={{0x5, 0xfffffffa}, 0x100, './file0/file0\x00'}) 00:21:17 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:17 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0xa, 0x0) 00:21:17 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:17 executing program 7: perf_event_open(&(0x7f0000000000)={0x4, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x12800, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc}, 0x0, 0xfffffffffffffffd, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) sendmsg(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000140)=@alg={0x26, 'rng\x00', 0x0, 0x0, 'drbg_nopr_sha256\x00'}, 0x80, &(0x7f00000002c0)=[{&(0x7f00000001c0)="1a325ee7f9da3cfdcf016632974fa5f74f3bb0d5563e3e0075cf230d1ad0c429f874aa59a0407e606623326b6b586a3a21e22a04bb3eb32c", 0x38}, {&(0x7f0000000200)="82a090c24d334ddcdda26eb29f3a307e0638bbdd44827c34dedf1d4beb863d64207f50ca8730bd6fc238dba41aa3e7875421e3b89dfe5ec781d1cfedce2a83e23243e46ff2a04a89831e755ed5dd7a9e5231027f9adc95dfccbe8a055ac70bd37b269555d7262ad3561bbb95c9adcd5273b919a478ba892f6713e86d12bf7376442dd421d298af4bb19da8", 0x8b}], 0x2}, 0x4000) 00:21:17 executing program 4: io_setup(0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r0, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, r0, 0x4) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) io_submit(0x0, 0x3, &(0x7f0000000540)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x40, 0xffffffffffffffff, &(0x7f0000000240)="39e1855c25a7f8d08bbceb2309dd614b86eb64a345a856afb7f3191fc90c6e41e0ee2cf0c3c89a37c397ff7ec3a0b151ab4ce20259af864a6d24dc4a3ed1ed123ef0f19e9b35e724e3fbb8c9f042bcdfd405cb020cf2448711efb2cde36528b09647f87fed701d557446328fadef2b400680d6bf1ceb2ea53fa2acf1f84dbe68caeeda2282b98b9b1e5b4b4f42db9f4359412d46eb9f56e5", 0x98, 0x3, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffff, &(0x7f0000000300)="3997068998ca375076fa353669e65ad3252413dc991dda7b9d313cbb927454d917f1d80f57499ea2f5445fe206691dd532d49744181a62fc7d91a5d5e90323f7cfc626be5213b9476bb4dd4afae07703100bb9271526338e54a17da8e03b588a23c38ec617f3eed2602b8c9968e36355330756d997c5174f4942b3151c3e8dace03640587132b071ef5d8151f702e26b35ea96ad75922289fabe6c8dd924f9d3bfbdfb8fde18baa3796a367582aec2b66b121cb0b0f5b25e7ec9f2cf8a", 0xbd, 0x0, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0xbebc, r0, &(0x7f0000000440)="785f98c397810ed99c942e6e724bb4a9f03632cf6acda0d1f0c2a979bb26e204cfc88e3a67620556f90f5c3d47686bdfc1c2e094aaf715e0c25e73cc0b9c768b137b25e3da4f559ee238e56e0b52128f678fa4dc713050dee8f1f0923087d52592dcfbf53fae369b9a69a93141d5e584f6f4f53caa015eb50d8f17a8e721c858cb4c36dbe436b87a70", 0x89, 0x7, 0x0, 0x2}]) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdab39eac554c6bee, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x208, &(0x7f0000000080)=0x0) syz_open_procfs$userns(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0}]) pipe(0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000002}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000012c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="04696c65300000"]) eventfd(0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000002}) read(0xffffffffffffffff, &(0x7f0000001440)=""/199, 0xc7) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 00:21:17 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x4, 0x6, 0x46, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0x100000000, 0x7}, 0x11890, 0x1f, 0x2006, 0x6, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x8}, r1, 0x6, r2, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000001100)={0xf, 0x80, 0x40, 0x57, 0x1, 0x4, 0x0, 0x6d51033e, 0x2008, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x4, @perf_config_ext={0x9, 0xfffffffffffffffc}, 0x1088, 0xd1, 0x40, 0x0, 0x8, 0x0, 0x7, 0x0, 0xffff}) r3 = getpgrp(0x0) process_vm_writev(r3, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r3, 0x8, &(0x7f0000000300)) perf_event_open(&(0x7f0000000700)={0x0, 0x80, 0x89, 0x80, 0x8, 0x4, 0x0, 0x6, 0x18010, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_config_ext={0x4, 0x9}, 0x40, 0x1, 0x4, 0x7, 0x7f, 0x6, 0x400, 0x0, 0x20, 0x0, 0x3c5}, r3, 0x6, 0xffffffffffffffff, 0xc) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000300)={0x0, 0x0, {0x0, @struct, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {}, {0x0, @struct}}) futimesat(r4, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0)={{0x77359400}, {0x0, 0x2710}}) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0xb9, 0x2, 0x6, 0x78, 0x0, 0x7, 0x808, 0x8, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_config_ext={0x1, 0x9}, 0x1, 0x7, 0x9, 0x8, 0x0, 0xfd2, 0x3f, 0x0, 0x5, 0x0, 0x9e51}, 0x0, 0x2, 0xffffffffffffffff, 0x0) futimesat(r0, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000200)={{0x0, 0x2710}, {0x77359400}}) io_setup(0x6, &(0x7f00000012c0)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:21:17 executing program 2: r0 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000280), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f00000002c0)={'wpan3\x00', 0x0}) ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000480)={'wpan4\x00', 0x0}) sendmsg$IEEE802154_LIST_IFACE(0xffffffffffffffff, &(0x7f0000000580)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x20}, 0xc, &(0x7f0000000540)={&(0x7f0000000600)=ANY=[@ANYBLOB='T\x00\x00\x00', @ANYRES16=r0, @ANYBLOB="00032bbd7000fbdbdf251f0000000a0001007770616e3000000008000200", @ANYRES32=r1, @ANYBLOB="08000200", @ANYRES32=r2, @ANYBLOB="0a0001007770616e3300000008000200", @ANYRES32=0x0, @ANYBLOB="08000200", @ANYRES32=0x0, @ANYBLOB="007d99aba98ba353f827d215ee4ecf40e7d5fc", @ANYRES32=0x0, @ANYBLOB], 0x54}}, 0x8040) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f00000000c0), 0x6e, &(0x7f0000000240)=[{&(0x7f0000000380)=""/252, 0xfc}, {&(0x7f0000000000)=""/64, 0x40}], 0x2, &(0x7f0000000140)=ANY=[@ANYBLOB="85e1627de8206a0eb6ee4a19d518000030d10910cfc963806d346c0d4aa40d44500cd8c79de0a165b5dcde63ee5a45aeba5a4bfb83264463dea8471907eec4cd4c65c73dcba97aacb889fec14b9e727f88693682cd9c13b6eb5028182208a092ae30ca3f19e5e13e21", @ANYRES32, @ANYRES32, @ANYBLOB="2c000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32, @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB='\x00\x00\x00\x00'], 0x48}, 0x10000) ioctl$RTC_WKALM_RD(r3, 0x80287010, &(0x7f0000000340)) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x7) ioctl$RTC_ALM_SET(0xffffffffffffffff, 0x40247007, &(0x7f00000005c0)={0x1d, 0x3a, 0x14, 0xf, 0x8, 0x3f, 0x1, 0x139}) 00:21:17 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:17 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x63, 0x0) 00:21:17 executing program 3: syz_emit_ethernet(0x136, &(0x7f00000001c0)={@link_local, @dev, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, "c770cc", 0x100, 0x3a, 0xff, @local, @mcast2, {[], @ndisc_ra={0x86, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x0, [{0x0, 0x1d, "2a94b064bfcabdaabb8cd5309bf220d0a49af1af9a2608a5f54f1971cf3d3ba94abd965ad3c687deca3eba10b52318114216a0dad2e5a23b2dd4153b6e8e60cf660a0201d21fa36a6aff628305dcc7bf2218c99d8813dd069b6bd7b1bbeaf381c6965646e78418be54db5eedf4c7e781ba79b112c040913a2088aff1c33cc139fc8708c9b09949c719e69fe6ad9f6c8faadf1048875ebcfca8cb62aa9bd062e32e551a70bd9176b560d98ea580a6ea18892dc6b50d5a20fc413ea5948a909387f73e28288cd1e4e12cdc744b48d1e2cdab6c6974408e73e66a0f446cd1a093d67fb1dd35f4f27a010b1c"}, {0x0, 0x0, "eb50"}]}}}}}}, 0x0) syz_emit_ethernet(0x36, &(0x7f0000000080)={@empty, @broadcast, @val={@void, {0x8100, 0x1, 0x1, 0x1}}, {@llc={0x4, {@llc={0x4, 0x42, "e7ad", "7eff0386c8746f6c0608eb927fc5692f35becce5ced327074ac043eb45c2e858"}}}}}, &(0x7f00000000c0)={0x1, 0x3, [0x98f, 0xaed, 0x6b1, 0x285]}) syz_emit_ethernet(0x26, &(0x7f0000000000)={@random="5867485141c4", @random="57af2948c944", @val={@val={0x9100, 0x3, 0x1, 0x1}, {0x8100, 0x4, 0x1, 0x3}}, {@can={0xc, {{0x3, 0x0, 0x0, 0x1}, 0x1, 0x2, 0x0, 0x0, "f671c7df967f575f"}}}}, &(0x7f0000000040)={0x0, 0x2, [0xcca, 0xd43, 0xe57, 0xef2]}) 00:21:17 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:17 executing program 4: io_setup(0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r0, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, r0, 0x4) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) io_submit(0x0, 0x3, &(0x7f0000000540)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x40, 0xffffffffffffffff, &(0x7f0000000240)="39e1855c25a7f8d08bbceb2309dd614b86eb64a345a856afb7f3191fc90c6e41e0ee2cf0c3c89a37c397ff7ec3a0b151ab4ce20259af864a6d24dc4a3ed1ed123ef0f19e9b35e724e3fbb8c9f042bcdfd405cb020cf2448711efb2cde36528b09647f87fed701d557446328fadef2b400680d6bf1ceb2ea53fa2acf1f84dbe68caeeda2282b98b9b1e5b4b4f42db9f4359412d46eb9f56e5", 0x98, 0x3, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffff, &(0x7f0000000300)="3997068998ca375076fa353669e65ad3252413dc991dda7b9d313cbb927454d917f1d80f57499ea2f5445fe206691dd532d49744181a62fc7d91a5d5e90323f7cfc626be5213b9476bb4dd4afae07703100bb9271526338e54a17da8e03b588a23c38ec617f3eed2602b8c9968e36355330756d997c5174f4942b3151c3e8dace03640587132b071ef5d8151f702e26b35ea96ad75922289fabe6c8dd924f9d3bfbdfb8fde18baa3796a367582aec2b66b121cb0b0f5b25e7ec9f2cf8a", 0xbd, 0x0, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0xbebc, r0, &(0x7f0000000440)="785f98c397810ed99c942e6e724bb4a9f03632cf6acda0d1f0c2a979bb26e204cfc88e3a67620556f90f5c3d47686bdfc1c2e094aaf715e0c25e73cc0b9c768b137b25e3da4f559ee238e56e0b52128f678fa4dc713050dee8f1f0923087d52592dcfbf53fae369b9a69a93141d5e584f6f4f53caa015eb50d8f17a8e721c858cb4c36dbe436b87a70", 0x89, 0x7, 0x0, 0x2}]) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdab39eac554c6bee, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x208, &(0x7f0000000080)=0x0) syz_open_procfs$userns(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0}]) pipe(0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000002}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000012c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="04696c65300000"]) eventfd(0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000002}) read(0xffffffffffffffff, &(0x7f0000001440)=""/199, 0xc7) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 00:21:29 executing program 2: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) epoll_wait(r1, &(0x7f0000001440)=[{}, {}], 0x2, 0x9) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$BTRFS_IOC_DEFRAG(r1, 0x50009402, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x8, 0x3, &(0x7f0000001340)=[{&(0x7f00000001c0)="9da9274a8f9d9b9ce560aceba8f891cdb0dce0bbfc83d1f8420b8863bb74b271503fea1b461568ee6c13a4c17b37621961eac4daea327bedba8daad44bf1e7fed1aa3df9b4bd1ef0e6527e8e262ea360d71dde540f6feb5acaf77d60a0e63edee715feaa25275ddc21ec152c80ce63efbafaeab8c006a0c9a625183472276ffdc59e52f237b9d72a198ab21b8d6a521583cf4d0b736c0b4a5b9669ecc53a099a507af7e06e13bb2255368c835ba945d2a26f2d86f87b8ddad357421da7f9d593a8f6f0fe8201b1e1c85aba3c435cb41637a6c6a63c9561e4ca39b822cadee8bd444e494f0acb315f", 0xe8}, {&(0x7f00000002c0)="86ffafc45ede6bef841beb342e61c4c6c1df69493b1b9e3a45ffe8891dfac88360cd82df5a504bc5c2fee4186697959fc2c1198571775d21a2e5593b8ab8d2c0817c1ad3f6d9c1454665829deb4e0cf1f6efe7fb7e55fc6504dee326d97d342e28322c6c924109282a2192befd180439aad3c86199024d97", 0x78, 0x4}, {&(0x7f0000000340)="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", 0x1000, 0xffff}], 0x21, &(0x7f00000013c0)={[{')'}, {}, {'[,,@#'}, {'.}!'}, {}, {'!'}], [{@hash}, {@subj_user={'subj_user', 0x3d, '/'}}, {@func={'func', 0x3d, 'MODULE_CHECK'}}, {@subj_user}, {@fowner_eq}, {@audit}, {@appraise_type}, {@audit}]}) 00:21:29 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:29 executing program 3: io_setup(0x8, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r0, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, r0, 0x4) sendmsg$AUDIT_TTY_SET(r0, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) io_submit(0x0, 0x3, &(0x7f0000000540)=[&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x2, 0x40, 0xffffffffffffffff, &(0x7f0000000240)="39e1855c25a7f8d08bbceb2309dd614b86eb64a345a856afb7f3191fc90c6e41e0ee2cf0c3c89a37c397ff7ec3a0b151ab4ce20259af864a6d24dc4a3ed1ed123ef0f19e9b35e724e3fbb8c9f042bcdfd405cb020cf2448711efb2cde36528b09647f87fed701d557446328fadef2b400680d6bf1ceb2ea53fa2acf1f84dbe68caeeda2282b98b9b1e5b4b4f42db9f4359412d46eb9f56e5", 0x98, 0x3, 0x0, 0x1}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x7, 0x1, 0xffffffffffffffff, &(0x7f0000000300)="3997068998ca375076fa353669e65ad3252413dc991dda7b9d313cbb927454d917f1d80f57499ea2f5445fe206691dd532d49744181a62fc7d91a5d5e90323f7cfc626be5213b9476bb4dd4afae07703100bb9271526338e54a17da8e03b588a23c38ec617f3eed2602b8c9968e36355330756d997c5174f4942b3151c3e8dace03640587132b071ef5d8151f702e26b35ea96ad75922289fabe6c8dd924f9d3bfbdfb8fde18baa3796a367582aec2b66b121cb0b0f5b25e7ec9f2cf8a", 0xbd, 0x0, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x2, 0xbebc, r0, &(0x7f0000000440)="785f98c397810ed99c942e6e724bb4a9f03632cf6acda0d1f0c2a979bb26e204cfc88e3a67620556f90f5c3d47686bdfc1c2e094aaf715e0c25e73cc0b9c768b137b25e3da4f559ee238e56e0b52128f678fa4dc713050dee8f1f0923087d52592dcfbf53fae369b9a69a93141d5e584f6f4f53caa015eb50d8f17a8e721c858cb4c36dbe436b87a70", 0x89, 0x7, 0x0, 0x2}]) socketpair$unix(0x1, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdab39eac554c6bee, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x5, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x208, &(0x7f0000000080)=0x0) syz_open_procfs$userns(0x0, 0x0) io_submit(r1, 0x1, &(0x7f0000000200)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x10, 0xffffffffffffffff, 0x0}]) pipe(0x0) r2 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r2, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000002}) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f00000012c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="04696c65300000"]) eventfd(0x0) ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x0, 0x10000002}) read(0xffffffffffffffff, &(0x7f0000001440)=""/199, 0xc7) connect$unix(0xffffffffffffffff, &(0x7f0000000140)=@file={0x0, './file0\x00'}, 0x6e) 00:21:29 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:29 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:29 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x82, 0x0) 00:21:29 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001880)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r0, 0x400, 0x0) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000240), 0x41, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) write$snapshot(0xffffffffffffffff, &(0x7f0000000280)="ca281cadc37e5932d64a293dacaabbf9d287491aa29c481b4142462a6a3a8d31d3fbb20d794af61ef5d23d62e15bf7e7d6a1157776bf053bb231124ba875f19709831683d508259c38ffded904b2cda5090153d0a56fba7579b1aa93e5584b4e7904bd7fab571a3a6268037173a864fbac6006a40e2c9a045df20412452008d0076c5f50b4cf3decf10ba5039ebdfe44c4dac019fc7fb5e58639ab1fbc4c06374f7f9c2f13a18977812a7619fca4b51751398f83bcb4a1a3970c983cfadbea8001bd7b5bf844", 0xc6) pread64(r0, &(0x7f0000000140)=""/36, 0x24, 0x0) fcntl$setlease(r0, 0x400, 0x2) [ 1000.942366] random: crng reseeded on system resumption 00:21:29 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x83, 0x0) 00:21:29 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:29 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f00000000c0)={0x1, &(0x7f0000000040)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40082102, &(0x7f0000000000)) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r3, 0x40182103, &(0x7f0000000100)={0x0, 0x0, r0, 0xa0}) 00:21:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x2, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) sendmsg$AUDIT_MAKE_EQUIV(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x8000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x2c, 0x3f7, 0x100, 0x70bd28, 0x25dfdbfb, {0x7, 0xd, './file0', './file0/file0'}, ["", "", "", "", "", ""]}, 0x2c}, 0x1, 0x0, 0x0, 0x8040}, 0x400) 00:21:29 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x84, 0x0) 00:21:30 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:30 executing program 4: r0 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/module/8250', 0x121401, 0x8) write$cgroup_pid(r0, &(0x7f0000000000), 0x12) 00:21:30 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:30 executing program 4: perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, 0x18, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x48}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f00000002c0), 0x0, 0x0) r1 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x0) r2 = dup2(r1, r0) ioctl$BLKTRACESETUP(r2, 0x227f, &(0x7f0000000040)={'\x00', 0x4, 0x14000ffe, 0x0, 0x40000, 0x40000000020}) 00:21:30 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x40400, 0x0) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r4 = fork() r5 = fork() kcmp(r4, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r6 = getpid() setpgid(r5, r6) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x3, 0x0, 0x7, 0x80, 0x0, 0x1000000000001f, 0x50, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x8001, 0x7662}, 0x5c234, 0x5, 0x800, 0x2, 0xff, 0x3, 0x2, 0x0, 0x5, 0x0, 0x8}, r6, 0xa, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) clone3(&(0x7f0000000f80)={0x40000, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0), {0x1c}, &(0x7f0000003300)=""/4119, 0x1017, &(0x7f0000000400)=""/73, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0xffffffffffffffff, r4, 0x0, r2, r2, r5, 0x0], 0xa, {r3}}, 0x58) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000001c0)={0x80000008}) pread64(r0, &(0x7f0000000200)=""/163, 0xa3, 0x8) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x2, 0x101) statfs(&(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)=""/31) 00:21:30 executing program 2: add_key$keyring(0x0, &(0x7f0000000040)={'syz', 0x1}, 0x0, 0x0, 0xfffffffffffffffc) mq_notify(0xffffffffffffffff, &(0x7f0000000080)={0x0, 0x33, 0x6, @thr={&(0x7f0000000000)="24aea3d9092d93eae7ff10358c5a5c338f81a1b4049bcd69bf50", &(0x7f0000000240)="732e0adb"}}) request_key(&(0x7f00000000c0)='keyring\x00', &(0x7f0000000100)={'syz', 0x2}, &(0x7f0000000140)='\\:{:[(^{,@!\x00', 0xfffffffffffffffc) io_cancel(0x0, &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x5, 0xffffffffffffffff, &(0x7f0000000180)="ecb038f47536dbc30c4705a930e158abd91b0369840d7c", 0x17, 0x0, 0x0, 0x1}, &(0x7f0000000200)) r0 = openat$sysfs(0xffffffffffffff9c, 0x0, 0x400001, 0x40) io_uring_register$IORING_REGISTER_EVENTFD(0xffffffffffffffff, 0x4, &(0x7f0000000280)=r0, 0x1) eventfd2(0x5c, 0x0) io_setup(0x80000000, &(0x7f0000000400)=0x0) syz_open_dev$char_usb(0xc, 0xb4, 0x100000001) io_submit(r1, 0x0, &(0x7f00000016c0)) syz_usb_connect(0x3, 0x36, &(0x7f0000001700)=ANY=[@ANYBLOB="1201256e00f00a57d04199010203010902240001000500070904000002b3a68b0009050000ff03de0000090500000000000000"], 0x0) io_setup(0x0, 0x0) 00:21:30 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x85, 0x0) 00:21:30 executing program 3: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000080), 0xffffffffffffffff) r2 = syz_open_procfs$namespace(0xffffffffffffffff, &(0x7f0000000100)='ns/time_for_children\x00') sendmsg$NL802154_CMD_SET_WPAN_PHY_NETNS(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f0000000180)={&(0x7f0000000140)={0x24, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_PHY={0x8}, @NL802154_ATTR_NETNS_FD={0x8, 0x1d, r2}]}, 0x24}}, 0x0) r3 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) r4 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL802154_CMD_SET_CHANNEL(r4, &(0x7f0000000b00)={0x0, 0x0, &(0x7f0000000ac0)={&(0x7f0000000a40)={0x24, r3, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_PAGE={0x5}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x24}}, 0x0) r5 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r6 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r7 = syz_genetlink_get_family_id$ieee802154(&(0x7f00000007c0), r6) r8 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r8, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) sendmsg$IEEE802154_LLSEC_SETPARAMS(r5, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f00000003c0)={0x40, r7, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_LLSEC_KEY_MODE={0x5, 0x2b, 0x3}, @IEEE802154_ATTR_LLSEC_KEY_SOURCE_EXTENDED={0xc}, @IEEE802154_ATTR_DEV_INDEX={0x8, 0x2, r9}, @IEEE802154_ATTR_LLSEC_KEY_ID={0x5}, @IEEE802154_ATTR_LLSEC_FRAME_COUNTER={0x8}]}, 0x40}}, 0x0) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f0000000040)={'wpan3\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f00000001c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000000c0)={&(0x7f0000000240)={0x50, r3, 0x200, 0x70bd2a, 0x25dfdbfb, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r9}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x3}, @NL802154_ATTR_WPAN_PHY={0x8, 0x1, 0x2}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x100000001}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r10}]}, 0x50}, 0x1, 0x0, 0x0, 0x1}, 0x40000) [ 1001.550998] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1001.554395] misc raw-gadget: fail, usb_gadget_register_driver returned -16 00:21:39 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:39 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007540)=[{{&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000007c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast1}}}], 0x20}}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @remote, @private}, &(0x7f0000000440)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000700)={'gre0\x00', &(0x7f0000000680)={'gre0\x00', r1, 0x8000, 0x8000, 0x138d, 0xbfa0, {{0xb, 0x4, 0x2, 0x0, 0x2c, 0x64, 0x0, 0x2, 0x2f, 0x0, @rand_addr=0x64010101, @multicast2, {[@timestamp={0x44, 0x8, 0xdc, 0x0, 0xe, [0x3ff]}, @generic={0x44, 0xe, "8fa7a2bc8c139de50247bf07"}]}}}}}) accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x1b4, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x800}, 0x1) r5 = mq_open(&(0x7f00000001c0)='\x7f#:E,,\x00\x9e\\\xe5\x9a\x86{w\x1f1\xfcN\x85U_0\x96\x13\xab\x12\b\x00\x00\x00\xfe\xc6\xf3\xf9\x05\x8deeU?5\x19\x88\xef;:\xb2#\x1b\\\x98.\x04+\xa3\xc4:\xdbj\xfb\x0f\xf1\xe0y\xe8+9\xa6#\x1e\xf0P\x8c#h\xbb\f\x0e\x18\x87\xc4\n\x92zK/\xe2\x10M8\x9a\xf0\x02\xab,\xb5\xc5\x81\x99\x00'/124, 0x40, 0x0, 0x0) mq_timedsend(r5, &(0x7f0000000040)="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", 0xfa, 0x80, &(0x7f0000000140)={0x0, 0x989680}) r6 = dup2(r5, r5) mq_notify(r6, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000059c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRESOCT=r6, @ANYRES32=r6, @ANYRESHEX=r6], 0x28}}], 0x2, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000180), 0x2, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r7, 0xf501, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)) fsetxattr$trusted_overlay_origin(r7, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x2) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) clone3(&(0x7f0000000240)={0x61020100, &(0x7f00000056c0), 0x0, 0x0, {}, &(0x7f00000001c0)=""/96, 0x54, 0x0, &(0x7f0000000000), 0x3}, 0x58) 00:21:39 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) connect$unix(r2, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) connect$unix(r0, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 00:21:39 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0xd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000140), 0x40400, 0x0) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r4 = fork() r5 = fork() kcmp(r4, r5, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r6 = getpid() setpgid(r5, r6) perf_event_open(&(0x7f00000002c0)={0x3, 0x80, 0x3, 0x0, 0x7, 0x80, 0x0, 0x1000000000001f, 0x50, 0x8, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, @perf_config_ext={0x8001, 0x7662}, 0x5c234, 0x5, 0x800, 0x2, 0xff, 0x3, 0x2, 0x0, 0x5, 0x0, 0x8}, r6, 0xa, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) clone3(&(0x7f0000000f80)={0x40000, &(0x7f0000000340), &(0x7f0000000380), &(0x7f00000003c0), {0x1c}, &(0x7f0000003300)=""/4119, 0x1017, &(0x7f0000000400)=""/73, &(0x7f0000000f40)=[0x0, 0x0, 0x0, 0xffffffffffffffff, r4, 0x0, r2, r2, r5, 0x0], 0xa, {r3}}, 0x58) epoll_ctl$EPOLL_CTL_MOD(r3, 0x3, r1, &(0x7f00000001c0)={0x80000008}) pread64(r0, &(0x7f0000000200)=""/163, 0xa3, 0x8) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000180)=0x2, 0x101) statfs(&(0x7f0000000480)='./file0\x00', &(0x7f00000000c0)=""/31) 00:21:39 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x86, 0x0) 00:21:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x200) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) inotify_add_watch(r1, &(0x7f0000000180)='./file1\x00', 0x40000000) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs2/binder-control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file1\x00', 0x127) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x7, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$FICLONE(r2, 0x40049409, r4) 00:21:39 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:39 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb8100"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:39 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:21:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x2, 0x0) bind$unix(r0, &(0x7f0000000040)=@file={0x1, './file0\x00'}, 0x6e) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f00000001c0), 0x1, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) connect$unix(r2, &(0x7f0000000140)=@abs={0x0, 0x0, 0x4e23}, 0x6e) connect$unix(r0, &(0x7f00000003c0)=@file={0x1, './file0\x00'}, 0x6e) connect$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) 00:21:49 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb8100"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:49 executing program 4: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(0xffffffffffffffff, &(0x7f0000007540)=[{{&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000007c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @loopback, @multicast1}}}], 0x20}}], 0x1, 0x0) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @remote, @private}, &(0x7f0000000440)=0xc) ioctl$sock_ipv4_tunnel_SIOCGETTUNNEL(0xffffffffffffffff, 0x89f0, &(0x7f0000000700)={'gre0\x00', &(0x7f0000000680)={'gre0\x00', r1, 0x8000, 0x8000, 0x138d, 0xbfa0, {{0xb, 0x4, 0x2, 0x0, 0x2c, 0x64, 0x0, 0x2, 0x2f, 0x0, @rand_addr=0x64010101, @multicast2, {[@timestamp={0x44, 0x8, 0xdc, 0x0, 0xe, [0x3ff]}, @generic={0x44, 0xe, "8fa7a2bc8c139de50247bf07"}]}}}}}) accept$packet(0xffffffffffffffff, &(0x7f0000000740)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @link_local}, &(0x7f0000000780)=0x14) sendmsg$ETHTOOL_MSG_PAUSE_GET(0xffffffffffffffff, &(0x7f00000009c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000980)={&(0x7f00000007c0)={0x1b4, 0x0, 0x400, 0x70bd25, 0x25dfdbfb, {}, [@HEADER={0x2c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve0\x00'}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'ip6erspan0\x00'}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_team\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'geneve1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x5c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bond_slave_1\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'tunl0\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}]}, @HEADER={0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'lo\x00'}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'wg0\x00'}]}, @HEADER={0x60, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'veth0_to_batadv\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'vlan0\x00'}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r1}, @ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'bridge0\x00'}]}, @HEADER={0x34, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}, @ETHTOOL_A_HEADER_FLAGS={0x8}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r2}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r3}, @ETHTOOL_A_HEADER_DEV_INDEX={0x8, 0x1, r4}, @ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x3}]}, @HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8, 0x3, 0x1}]}]}, 0x1b4}, 0x1, 0x0, 0x0, 0x800}, 0x1) r5 = mq_open(&(0x7f00000001c0)='\x7f#:E,,\x00\x9e\\\xe5\x9a\x86{w\x1f1\xfcN\x85U_0\x96\x13\xab\x12\b\x00\x00\x00\xfe\xc6\xf3\xf9\x05\x8deeU?5\x19\x88\xef;:\xb2#\x1b\\\x98.\x04+\xa3\xc4:\xdbj\xfb\x0f\xf1\xe0y\xe8+9\xa6#\x1e\xf0P\x8c#h\xbb\f\x0e\x18\x87\xc4\n\x92zK/\xe2\x10M8\x9a\xf0\x02\xab,\xb5\xc5\x81\x99\x00'/124, 0x40, 0x0, 0x0) mq_timedsend(r5, &(0x7f0000000040)="9908ab2286b70bd7ad79fadf621bb29175d3cbe8061d7c04e8094fcf1d66f53019ae90a0d97c9b0f64da794493fad697da7d5fedb0ab24f5e6c8724a5a5b0524b0eae8d56a9e04194286e8fbcb55f5d0b3f895434d08ddfefdf75e03e8d64b08a0ecae5c5dcc5f84deddbc8e1a9cf9e941cb95f32e9695a59b202f03b19f355d56b9626d5a7543e8b8e60d8a06eaf565d35f9e6f0af25a9b0d5c7595dce56dd8ec210fcad061c0186e08408f99d205752f03e48a97912173448cb1e0b1784eaa764455b09162f3b619df0966d7de9bd74b5295abe15de5ce6678f97fb3a7a359c0dd2aab53378b2b6209a44a605be5330063ad9500a73ac6628b", 0xfa, 0x80, &(0x7f0000000140)={0x0, 0x989680}) r6 = dup2(r5, r5) mq_notify(r6, 0x0) sendmmsg$inet6(0xffffffffffffffff, &(0x7f00000059c0)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000000540)=ANY=[@ANYRESOCT=r6, @ANYRES32=r6, @ANYRESHEX=r6], 0x28}}], 0x2, 0x0) r7 = openat$cgroup_subtree(r6, &(0x7f0000000180), 0x2, 0x0) ioctl$F2FS_IOC_START_ATOMIC_WRITE(r7, 0xf501, 0x0) r8 = socket$inet6_udplite(0xa, 0x2, 0x88) connect$inet6(r8, &(0x7f0000000000)={0xa, 0x0, 0x0, @remote, 0x2}, 0x1c) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000200)) fsetxattr$trusted_overlay_origin(r7, &(0x7f00000002c0), &(0x7f0000000300), 0x2, 0x2) setsockopt$inet6_tcp_TCP_REPAIR(0xffffffffffffffff, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) clone3(&(0x7f0000000240)={0x61020100, &(0x7f00000056c0), 0x0, 0x0, {}, &(0x7f00000001c0)=""/96, 0x54, 0x0, &(0x7f0000000000), 0x3}, 0x58) 00:21:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x88, 0x0) 00:21:49 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb8100"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:49 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x400000000000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() r2 = fork() kcmp(r1, r2, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r3 = getpid() setpgid(r2, r3) perf_event_open(&(0x7f0000000240)={0x3, 0x80, 0x8b, 0x8, 0x0, 0x40, 0x0, 0x5, 0xc, 0x4, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x7fff, 0x4, @perf_bp={&(0x7f0000000200)}, 0xa0, 0xfffffffffffffffe, 0x6, 0x5, 0x1f, 0x2, 0x9, 0x0, 0x40, 0x0, 0x8000}, r3, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) r4 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(r4, 0xc020f509, &(0x7f0000000140)={r0, 0x6, 0x5, 0x8}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r5, 0x2405, r0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) copy_file_range(r4, &(0x7f0000000180)=0x2, r0, &(0x7f00000001c0)=0x6, 0x5, 0x0) 00:21:49 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:21:49 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r2) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r1}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:49 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000140)='./file1\x00', 0x200) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000000280)={&(0x7f0000000240)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) inotify_add_watch(r1, &(0x7f0000000180)='./file1\x00', 0x40000000) r2 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f00000001c0)='./binderfs2/binder-control\x00', 0x0, 0x0) mkdirat(r1, &(0x7f0000000200)='./file1\x00', 0x127) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x7, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$FICLONE(r2, 0x40049409, r4) 00:21:49 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:50 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, 0x0, 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:50 executing program 7: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r2 = signalfd(r1, &(0x7f0000000180)={[0xa862]}, 0x8) pread64(r2, &(0x7f00000001c0)=""/227, 0xe3, 0x51cf) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) close_range(r1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r3, 0xee00, 0xffffffffffffffff) 00:21:50 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x89, 0x0) 00:21:50 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r2) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r1}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:21:50 executing program 7: r0 = getpgid(0xffffffffffffffff) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f00000001c0)=0x80) fadvise64(r1, 0x6, 0x2178, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getdents(r2, &(0x7f0000000200)=""/110, 0x6e) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x1a, 0x1, 0xf1, 0x80, 0x0, 0x5, 0x20080, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa07, 0x1, @perf_bp={&(0x7f0000000280), 0xa}, 0x0, 0x3f, 0xe69, 0x3, 0xfff, 0x10000, 0xf000, 0x0, 0x5, 0x0, 0x4}, r0, 0x10, 0xffffffffffffffff, 0x0) 00:21:50 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb8100"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:21:50 executing program 2: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r2 = signalfd(r1, &(0x7f0000000180)={[0xa862]}, 0x8) pread64(r2, &(0x7f00000001c0)=""/227, 0xe3, 0x51cf) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) close_range(r1, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r3, 0xee00, 0xffffffffffffffff) 00:21:50 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:01 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:01 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:01 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x6bb69aec, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:01 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x8f, 0x0) 00:22:01 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000040), &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000280)=ANY=[]) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount_setattr(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', 0x0, &(0x7f0000000000)={0x80, 0x2}, 0x20) 00:22:01 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:01 executing program 2: r0 = getpgid(0xffffffffffffffff) r1 = accept(0xffffffffffffffff, &(0x7f0000000140)=@pppol2tpin6={0x18, 0x1, {0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, {0xa, 0x0, 0x0, @private0}}}, &(0x7f00000001c0)=0x80) fadvise64(r1, 0x6, 0x2178, 0x3) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_FAIL(r1, 0x9361, 0x0) r2 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) getdents(r2, &(0x7f0000000200)=""/110, 0x6e) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f00000002c0)={0x4, 0x80, 0x1a, 0x1, 0xf1, 0x80, 0x0, 0x5, 0x20080, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0xa07, 0x1, @perf_bp={&(0x7f0000000280), 0xa}, 0x0, 0x3f, 0xe69, 0x3, 0xfff, 0x10000, 0xf000, 0x0, 0x5, 0x0, 0x4}, r0, 0x10, 0xffffffffffffffff, 0x0) 00:22:01 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r2) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r1}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:01 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000200)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000240), 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x88180, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_OCB(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200048c1}, 0x20008000) close_range(r0, 0xffffffffffffffff, 0x0) 00:22:01 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x5f5e0ff, 0x0) 00:22:02 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='fd\x00') openat(r0, &(0x7f0000000200)='./file0\x00', 0x604c00, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:02 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:02 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) creat(&(0x7f0000000100)='./file0\x00', 0x20) sendmsg$unix(r1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x0) 00:22:02 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:02 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:12 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:12 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:12 executing program 2: r0 = creat(&(0x7f00000000c0)='./file0\x00', 0x0) r1 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_int(r1, 0x6, 0x1e, &(0x7f0000000200)=0x1, 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000000)=0x1, 0x4) connect$inet6(r1, &(0x7f0000000040)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000240), 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f0000000080)=0xffffffffffffffff, 0x4) r2 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000100), 0x88180, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f0000000180)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_LEAVE_OCB(r2, &(0x7f00000002c0)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f0000000280)={&(0x7f00000001c0)={0x1c, 0x0, 0x400, 0x70bd2a, 0x25dfdbfc, {{}, {@val={0x8, 0x3, r3}, @void}}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x200048c1}, 0x20008000) close_range(r0, 0xffffffffffffffff, 0x0) 00:22:12 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r2) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r1}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:12 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0xfffffffffffffffe, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4040, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:12 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:12 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(0xffffffffffffffff, 0x0, r0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r1, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r2) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r1}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:12 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x2) 00:22:13 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:13 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x3) 00:22:13 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x51, 0xa0, 0x80, 0x0, 0x8, 0x40000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x2dc, 0x7}, 0x10080, 0x80000001, 0x8, 0x9, 0xff, 0xdec, 0x10, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0xf, r0, 0x2) 00:22:13 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f6907"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:13 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:13 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:13 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:13 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:13 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/21) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='\x00', 0x5c, 0x4, &(0x7f0000000580)=[{&(0x7f00000001c0)="686ef8a0bd67e04095f5f06de14614586090d6701a6177688b75afcec95ef252e4ae0415cb4c31c0f74295e14e4dd2c53bb29730c66dacfd88b6661f2227629393563780aa14a6b3df4466b3d74d4b8d30bf3c05a9b0775ce92d9c82ba32519d163eba615ab86a0901753b2a3a18779e5d1b242ba9d7d1394c4f713fd28015007af1c1d57fdb964ee5905f75f75deb6d7f2c7666", 0x94}, {&(0x7f0000000280)="ec0a19221dccf79574556c9a5142626dff9776bdef8eb6e099cf230f5d3e5bda2fdfaff791661fd9c46365f9d35bfb8337ce725269dd0ec0eb80079fd5fd3166ea42291831c797797fdd0c38996620413d331ff68b856c864f2321cc59ca1e43a20bc53088080d09622dfe8b43a9015509b558438b76f47f73a29e1377cbff832cc919068364f5c9ef4a03a8423c1acd2a0215c3d5324b9d68c45a8823894fcfa5f22120e12b2de686ea6773f9970abcf61b844a47cd1c7f4597634a19120b653602aa0732651b30ed3cca67fc73c3bba35c8122363f93765be18fd9e1", 0xdd, 0xffffffffffffff64}, {&(0x7f0000000380)="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", 0xff, 0x3}, {&(0x7f0000000480)="2451d745ba79ebdb30da30d132c5b2766a206faacac5a5ba7fc4c612e5d16b852ccf6b75d2615b4a18efac3dfb3afe9f095f66714df4a12a2c090502f3ee74acba02d89e5b3aa9ec00ad69336504b4f5a9fc2512cc161c6d1b469e5bf1263007a32f7e0f022f48b94696498ea32bcff6a6ce7bb70ab5524885d7c0882ca454c81fab406e693402c91cedee9b696c022b42101cdf0aff1c79766b5f9e4426a848f741a4863333787636adb165a44a3d806609f626a63d60bec05cf4a1eb6b478997a7aa1c421d4f5b86922c42e7e31c8b95", 0xd1}], 0x103800, &(0x7f0000000600)=ANY=[@ANYBLOB="6e6f646f74732c73686f7765ff0f0000646f7473177379735f696d6d757461626c652c646f74732c6e6f646f74732c7569643d", @ANYRESHEX, @ANYBLOB="2c636f6465706167653d3836312c636f6465706167653d3933362c6e6f646f74732c6f626a5f747970653d2c736d61636b66736465663d5cda2521292621235c232d5c2a2a5c2c7065726d69745f646972656374696f2c00"]) 00:22:13 executing program 2: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:13 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f6907"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:13 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:23 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:23 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(0xfffffffffffffffe, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x4040, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:23 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x1, 0x51, 0xa0, 0x80, 0x0, 0x8, 0x40000, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_config_ext={0x2dc, 0x7}, 0x10080, 0x80000001, 0x8, 0x9, 0xff, 0xdec, 0x10, 0x0, 0x9, 0x0, 0x1}, 0xffffffffffffffff, 0xf, r0, 0x2) 00:22:23 executing program 7: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001380)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000380)={{r0}, r3, 0x10, @unused=[0x8000, 0x7, 0x4], @name="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"}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:23 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f6907"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:23 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:23 executing program 2: perf_event_open(&(0x7f00000002c0)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x53805180, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = accept4$inet(0xffffffffffffffff, &(0x7f0000000000)={0x2, 0x0, @loopback}, &(0x7f0000000040)=0x10, 0x80800) pread64(r0, &(0x7f0000000080)=""/34, 0x22, 0x7) 00:22:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x4) 00:22:24 executing program 3: r0 = shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000ffd000/0x2000)=nil) shmat(r0, &(0x7f0000ffd000/0x1000)=nil, 0x0) syz_emit_ethernet(0x7e, &(0x7f00000000c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaaaaaaaaaaaaa81000a001c8736370660f83ef06086dd60a8d78e00442f00fe8000000000000000000000000000aafc0200004000000000000004000000002420880b0000000000000800000086dd080088be00000000100040000100000000000000080022eb00000000200000010200000000000000000000000800655800000000"], 0x0) 00:22:24 executing program 4: r0 = syz_open_dev$tty1(0xc, 0x4, 0x2) fcntl$setstatus(r0, 0x4, 0x40000) r1 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$TIOCL_PASTESEL(r0, 0x541c, &(0x7f0000000040)) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000300)) fallocate(r1, 0x10, 0x0, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) fcntl$notify(r2, 0x402, 0x10) accept4(r1, 0x0, &(0x7f00000000c0), 0x800) r3 = creat(&(0x7f0000000080)='./file1\x00', 0x0) ioctl$FS_IOC_SETFLAGS(r3, 0x40086602, &(0x7f0000000300)=0x800422) r4 = socket$inet_udplite(0x2, 0x2, 0x88) r5 = socket$packet(0x11, 0x3, 0x300) r6 = memfd_secret(0x80000) r7 = openat$nvram(0xffffffffffffff9c, &(0x7f0000004380), 0x6003, 0x0) io_submit(0x0, 0x4, &(0x7f0000004540)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x7, 0x9, r5, &(0x7f0000000280), 0x0, 0x5, 0x0, 0x2}, &(0x7f0000003340)={0x0, 0x0, 0x0, 0x1, 0x3, r6, &(0x7f0000002340)="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", 0x1000, 0x0, 0x0, 0x0, r3}, &(0x7f00000043c0)={0x0, 0x0, 0x0, 0x1, 0x401, r4, &(0x7f0000003380)="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", 0x1000, 0xb6, 0x0, 0x1, r7}, &(0x7f0000004500)={0x0, 0x0, 0x0, 0x1, 0x7fff, r2, &(0x7f0000004400)="25905f5e1150873a37fac2b64586a31eed10e1f93ac3b174160508b3fcf9c3407d24443e60d2888498c87d6f8f1493592a20884245e70388157103190f1e6389a4128e33edce79ed02a07ac9c5c2793167a6b218fff9c084d0c82aee912db9f8ad474cfeeff3ef5e4a92b80fbe30e85ad27d9e861e60fd979ee87d1c844bbd56021abb9091aebed78f1603f8381e4279a6789653ee627261419af9076f758c188898b6e4fadcf24e099666d648576e3ab9c334e78a1a861227b8f6a7e8dbb09f0842dbb5c0647928a083f05b368f6664c34c799f609aac3eaeb11418a828", 0xde, 0xfffffffffffff930, 0x0, 0x2}]) pwritev2(r4, &(0x7f0000000240)=[{&(0x7f0000000140)="82dab9c1e94cd9b210b4a77638d432d015b789281fbf96079ff5db0dd7915cc49ecd2ba7a08dd4ff5d8b81ae901c9a913fcd364944e2d1a9f4d90c925a0bfd47c275ff9db4188355e724c9536e041f2b9c5e9cd657b1d59c9c6896ccc4afaf5c7699137309d9f1b92b277db93bb62fca9764e07a5460ee76ff0cd0ee9bb2a96656206a65394e2ad1522e5ae7970c8f9fae2cdd8ddea781ddaf2534721c4f9a4acc6e31209f2c76f710681c684c4c7f725c", 0xb1}, {&(0x7f0000000340)="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", 0x1000}, {&(0x7f0000001340)="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", 0x1000}, {&(0x7f0000000200)="859aff4817305d89e1c4040a4bbd5c7bb5a5cbac5e16d74f0926630f5e47", 0x1e}], 0x4, 0xf6fb, 0x9, 0x4) fallocate(r3, 0x10, 0x0, 0x100000000) ioctl$KDGKBLED(r3, 0x4b64, &(0x7f0000000000)) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r3, 0x400c6615, &(0x7f0000000100)={0x0, @aes128, 0x0, @desc3}) [ 1055.587490] UDPLite: UDP-Lite is deprecated and scheduled to be removed in 2025, please contact the netdev mailing list 00:22:24 executing program 3: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc37a}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = epoll_create(0x6) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000040)={0xa0000003}) close_range(r0, 0xffffffffffffffff, 0x0) 00:22:24 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x5) 00:22:24 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) renameat(r1, &(0x7f0000000440)='./file0\x00', r1, &(0x7f0000000480)='./file0\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r4 = fspick(0xffffffffffffff9c, &(0x7f00000004c0)='./file0\x00', 0x1) perf_event_open(&(0x7f00000003c0)={0x2, 0x80, 0xbe, 0x7f, 0x9, 0x1f, 0x0, 0x81, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0xfff, 0x1, @perf_bp={&(0x7f0000000380), 0x4}, 0x4000, 0x200, 0x0, 0x7, 0x1, 0x5, 0x0, 0x0, 0x35e, 0x0, 0x5}, 0x0, 0x0, r3, 0x9) flock(r4, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000140)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000500)={0x3f, 0x9, 0x8, 0x2, 0x8, 0xf4b}) pread64(r0, &(0x7f0000000540)=""/157, 0x9d, 0x2) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:24 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a3"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:24 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f6907"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:37 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:37 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f0000001380)={0x0, ""/256, 0x0, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_DESTROY_V2(0xffffffffffffffff, 0x5000943f, &(0x7f0000000380)={{r0}, r3, 0x10, @unused=[0x8000, 0x7, 0x4], @name="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"}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0, 0x4}, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:37 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a3"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:37 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a3"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:37 executing program 3: syz_mount_image$ext4(&(0x7f0000000040)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000500100000f000000000000000100000005000000000004000040000020000000d4f4655fd4f4655f0100ffff53ef010001000000d4f4655f000000000000000001000000000000000b0000008000000018000000c20500002b02", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000b8c5c4d1b3cf4b38ab2e2967fb770ff3010040", 0x1f, 0x4e0}, {&(0x7f0000000080)="8278fe7915", 0x5, 0x560}], 0x8001, &(0x7f0000012f00)) open$dir(&(0x7f0000000000)='./file0\x00', 0x420082, 0x100) 00:22:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x6) 00:22:37 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0xfffffffffffffffe, 0x0, 0x3, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:22:37 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:48 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB, @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:48 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x14004, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x94}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000002c0)=""/26) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_xfrm(0x10, 0x3, 0x6) newfstatat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240), 0x6000) setxattr$trusted_overlay_opaque(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180), &(0x7f00000001c0), 0x2, 0x0) 00:22:48 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a3"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:48 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x141802, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0x9) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)="fa", 0x1}]) 00:22:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x7) 00:22:48 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:48 executing program 2: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(r0, &(0x7f0000000900)="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", 0x200) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x529400, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000340)={0x0, 0x3f, 0x7, 0x1}) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="870000002902000800000002030000000100000000000000000000000000f8ff0407002e2f66696c653020040000000000000000000000f7ffffffffffffff0907002e2f66696c65308a010000000600000000000000fbffffffffffffff0007002e2f66696c6530400000000003000000000000005a0500000000001a0407002e2f66696c6530"], 0x87) r3 = openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x42) write$binfmt_script(r3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], 0x1020) sendfile(r0, r1, 0x0, 0xfdef) 00:22:48 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x4840, 0x0) ioctl$CDROMREADAUDIO(r0, 0x530e, &(0x7f0000000040)={@lba=0x3, 0x2, 0x4a, 0x0}) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f00000001c0)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) r5 = gettid() r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r6, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r6, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r5, 0x8, r6, 0x4) sendmsg$AUDIT_TTY_SET(r6, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) setsockopt$sock_int(r6, 0x1, 0x1d, &(0x7f0000000240)=0x1, 0x4) getsockopt$IP_SET_OP_GET_BYINDEX(r6, 0x1, 0x53, &(0x7f0000000280)={0x7, 0x7, 0x4}, &(0x7f00000002c0)=0x28) sendmmsg$inet(r2, &(0x7f0000007540)=[{{&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000007c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @loopback, @multicast1}}}], 0x20}}], 0x1, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r1, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4000800) [ 1079.945640] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 1079.946487] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1079.947260] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1079.947990] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 1079.948757] blk_print_req_error: 9 callbacks suppressed [ 1079.948766] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 2 [ 1079.970209] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1079.971191] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1079.972477] buffer_io_error: 2070 callbacks suppressed [ 1079.972491] Buffer I/O error on dev sr0, logical block 0, async page read [ 1079.994403] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1079.995325] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 00:22:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8) [ 1079.996641] Buffer I/O error on dev sr0, logical block 1, async page read [ 1079.998170] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1079.999420] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1080.000830] Buffer I/O error on dev sr0, logical block 2, async page read [ 1080.006934] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.007450] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1080.008623] Buffer I/O error on dev sr0, logical block 3, async page read [ 1080.026799] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.027295] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1080.028385] Buffer I/O error on dev sr0, logical block 4, async page read [ 1080.043101] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.044341] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1080.045960] Buffer I/O error on dev sr0, logical block 5, async page read [ 1080.066471] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.067386] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1080.068682] Buffer I/O error on dev sr0, logical block 6, async page read [ 1080.087368] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.088282] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1080.089570] Buffer I/O error on dev sr0, logical block 7, async page read 00:22:48 executing program 2: r0 = creat(&(0x7f0000000300)='./file0\x00', 0x0) write(r0, &(0x7f0000000900)="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", 0x200) r1 = openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) r2 = openat$ptp0(0xffffffffffffff9c, &(0x7f0000000200), 0x529400, 0x0) ioctl$BTRFS_IOC_SCRUB_PROGRESS(r2, 0xc400941d, &(0x7f0000000340)={0x0, 0x3f, 0x7, 0x1}) fcntl$setstatus(r0, 0x4, 0x44000) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pidfd_open(0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$P9_RREADDIR(r0, &(0x7f0000000100)=ANY=[@ANYBLOB="870000002902000800000002030000000100000000000000000000000000f8ff0407002e2f66696c653020040000000000000000000000f7ffffffffffffff0907002e2f66696c65308a010000000600000000000000fbffffffffffffff0007002e2f66696c6530400000000003000000000000005a0500000000001a0407002e2f66696c6530"], 0x87) r3 = openat$cgroup_freezer_state(r0, &(0x7f0000000040), 0x2, 0x0) creat(&(0x7f00000001c0)='./file0\x00', 0x42) write$binfmt_script(r3, &(0x7f0000001b80)=ANY=[@ANYBLOB="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"], 0x1020) sendfile(r0, r1, 0x0, 0xfdef) 00:22:48 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7c", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:48 executing program 3: r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000440), 0x4840, 0x0) ioctl$CDROMREADAUDIO(r0, 0x530e, &(0x7f0000000040)={@lba=0x3, 0x2, 0x4a, 0x0}) r1 = syz_genetlink_get_family_id$fou(&(0x7f0000000080), r0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) setsockopt$sock_int(r0, 0x1, 0x1e, &(0x7f00000001c0)=0x100, 0x4) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) r5 = gettid() r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r6, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r6, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r5, 0x8, r6, 0x4) sendmsg$AUDIT_TTY_SET(r6, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) setsockopt$sock_int(r6, 0x1, 0x1d, &(0x7f0000000240)=0x1, 0x4) getsockopt$IP_SET_OP_GET_BYINDEX(r6, 0x1, 0x53, &(0x7f0000000280)={0x7, 0x7, 0x4}, &(0x7f00000002c0)=0x28) sendmmsg$inet(r2, &(0x7f0000007540)=[{{&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000007c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @loopback, @multicast1}}}], 0x20}}], 0x1, 0x0) sendmsg$FOU_CMD_DEL(r0, &(0x7f0000000180)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000140)={&(0x7f00000000c0)={0x70, r1, 0x400, 0x70bd25, 0x25dfdbfc, {}, [@FOU_ATTR_TYPE={0x5, 0x4, 0x1}, @FOU_ATTR_IFINDEX={0x8, 0xb, r4}, @FOU_ATTR_AF={0x5, 0x2, 0xa}, @FOU_ATTR_IFINDEX={0x8}, @FOU_ATTR_PEER_PORT={0x6, 0xa, 0x4e21}, @FOU_ATTR_PEER_V6={0x14, 0x9, @private2={0xfc, 0x2, '\x00', 0x1}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}, @FOU_ATTR_PEER_V6={0x14, 0x9, @ipv4={'\x00', '\xff\xff', @rand_addr=0x64010101}}, @FOU_ATTR_REMCSUM_NOPARTIAL={0x4}]}, 0x70}, 0x1, 0x0, 0x0, 0x4000}, 0x4000800) 00:22:48 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eaf"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:49 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a3"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:49 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000140)=""/216, 0xd8, 0x3f) io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r4 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x20000}, 0xc, &(0x7f0000001180)={&(0x7f0000000380)={0x18, 0x3f9, 0x100, 0x70bd29, 0x25dfdbfb, {0x0, 0x80001}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x44001}, 0x20040800) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0xb, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r6 = socket$inet6_tcp(0xa, 0x1, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r3, 0xc0189374, &(0x7f00000008c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="04df3a0000"]) io_submit(0x0, 0x8, &(0x7f0000000a80)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x2, r4, &(0x7f0000000240)="346b2a1d587af070bcbce3ea58339036f1cbe89d81d2283694b45eef1c4e3c9770d3c8f4", 0x24, 0x200, 0x0, 0x1, r3}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x8, 0x9, r1, &(0x7f00000002c0)="1c97555acc58033d1d316b5c04277584c61da6f0ea4114e5fd54a715f9664b609355f9646ee679f6a956872ec3996fd31371153f59f304ea1dcf72bb174dff8266c3e3330b94f34c63673fa291114f13ac76a599e069a6b46bb788933cf87d8715216af6ead06b30", 0x68, 0x1, 0x0, 0x0, r3}, &(0x7f0000000400)={0x0, 0x0, 0x0, 0x6, 0xa6, 0xffffffffffffffff, &(0x7f00000003c0)="41ccc6", 0x3, 0x4603, 0x0, 0x2, r3}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x1, 0xf4c6, 0xffffffffffffffff, &(0x7f0000000440)="6d93b60075c605570d757b4631de3a3de4d218619febf7cfba4bce0f653365035232d4f88e1f44c505fc001dc35785664881e8b6c9a12c8c9b2d4a2e7a04c25f24323594bb1aa30851f07c5c32ccde38ee7faff2bf422a2b7153b4fe57cfbc6c9150f0f1513308a3a4161f54530b9b53e89c62a5cfe8bfd600afb9adebcf523048c4822605833cff4094de0af89e2dc12bcb6cb00a810f4f8bfe", 0x9a, 0x4, 0x0, 0x1, r3}, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x3, 0x4, 0xffffffffffffffff, &(0x7f0000000580)="6212fdec5e97e3967d8aaa0bc488e6421a2128f023024bf53b3ec911fe2259185bc2cc15628e7d76ebef5a1515fc42afde2f7074862bc62d571d1a6e7f9266f058d1b11c17d24ff4ce8ee40f91f1b7d5df94403c7038fe99474adf046d2bc2b0d91962b6c0f3bfb52dd10e4cd9ddd1ea3a672b3b1bd176d7043ecca022d4bdc28df933cbfbd6eb96b9e69384d768e0a0c2c344517bf02d8229475b048e01c05ddae2bd72bdd7d522b45c6146b7a4667b1dd2b3a8dc2da7c3", 0xb8, 0x3f, 0x0, 0x1}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x6, 0xcc, 0xffffffffffffffff, &(0x7f0000000680)="2ae1dd2ab8a99232371fd40e33a0d5e1351aa9ddb209e5a2b076f04dec789900cba3dd2c041ff5347252c8dc76a9a0b38e05748ff89b8f7a3cd08aaabcc11cbedb1a9b5dfbcbdb12db3f4ef3cb0a4c063cbeb54eb33f869ac8ef2b06026d4b50b62b21ab03cdad49b793bb2219c8394ece983f2ea18541c786f15c2caf5d1f5537e6b499429a54b4d62fe4db2c1e950016e4865a1bfc670f12713dd38baa88e0c334003af35e5da72e0f90520ad591bbfb1fa5fc99aa09badb6b8f3ab054f9a872b211bd74f830d6a31dbd04c352dec535c3d2a10713702741b616d76f6875d52d32", 0xe2, 0x8, 0x0, 0x1, r5}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x3, 0x7a7, r6, &(0x7f00000007c0)="b28745e42a047069431ea22b74810b327f52610b0879b92fdf89815e3d45b06e8d01d185e444c27bdb65ebc895b8df39920a1385aa142c35faf7a7677ca1164573969b12adba415785cdff1e035485d7d79568fc66a1d54d55aa0b85d7b107c9aef8e320ccef61c3019d75a1d23121719c84e32a580623378a71e957a91244ff65b7270595f4b55292588379b59665567f3f76d6bb101973c4f012b8553f034a2ddc0e4767a19047aa0d32d5e688d4d92200f3b80b821ef313c962daa7ffe70017cdc3b11479c94824acb9462b5cd363ed95278ec7a84be5103b99d6313e181b110e2c9c051fe56baaae", 0xea, 0x3, 0x0, 0x1, r7}, &(0x7f0000000a40)={0x0, 0x0, 0x0, 0x1, 0x800, r1, &(0x7f0000000940)="2f5963a981ad0479d2f1bd365bba3734f85089dd4c6cebfe9bbb9d080597d4ab2a8f1d6181e3ea6a7c88d0da812575408d0716539b4b879674bf637cadbc42cebd025cd682480a7bf96c710bce5dbb59ce7e1316e17af5bf89f6777d900eaf18298b0b77e43c1d737789f294188534876abb5e2c8030fd7281d1beeebcfe1b23d97aa25bdb358d62cc4ffe97299be0beb4e1739bbfb29eceddbecfba5de8c6d4688cb5d2415bddbc8979a016fe971f55cf4a84b6a259840c07ccacf35cd6592eb4e17c06fba26cbb5370f1dfcb18d67b4600805b52e9ea1bb3", 0xd9, 0xffffffffffffffff, 0x0, 0x0, r3}]) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x8, 0x10, r3, 0x0) 00:22:49 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a3"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:22:49 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:22:49 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0xa) 00:22:49 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7c", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:22:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000080), 0x141802, 0x0) signalfd(0xffffffffffffffff, 0x0, 0x0) ioctl$FS_IOC_SETVERSION(r0, 0x40087602, &(0x7f0000000100)=0x9) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) io_setup(0x3, &(0x7f0000000040)=0x0) io_submit(r1, 0x1, &(0x7f00000003c0)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, r0, &(0x7f0000000000)="fa", 0x1}]) 00:22:49 executing program 2: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) [ 1080.676824] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 1080.677710] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1080.678358] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1080.678977] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 1080.679678] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 4 prio class 2 00:22:49 executing program 3: madvise(&(0x7f0000870000/0x4000)=nil, 0x4000, 0x17) mremap(&(0x7f0000871000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffd000/0x1000)=nil) mlock(&(0x7f0000ffa000/0x4000)=nil, 0x4000) madvise(&(0x7f0000871000/0x1000)=nil, 0x1000, 0x16) mbind(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x10001, 0x5) [ 1080.692888] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.693386] Buffer I/O error on dev sr0, logical block 0, async page read [ 1080.701003] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.702000] Buffer I/O error on dev sr0, logical block 1, async page read [ 1080.713068] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.717813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.722951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.731270] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.739737] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1080.744731] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 00:23:00 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7c", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000140)={0x3, 0x80, 0x3f, 0x2, 0x5, 0x80, 0x0, 0xff, 0x2043, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x1a8c1, 0x60b, 0x7fff, 0x6, 0x4a, 0x3, 0x3, 0x0, 0xffffffff, 0x0, 0xffffffffffff0000}) getdents64(r0, &(0x7f0000000200)=""/188, 0xbc) 00:23:00 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x10) 00:23:00 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eaf"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:00 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:00 executing program 2: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) syz_genetlink_get_family_id$nl802154(&(0x7f0000000040), 0xffffffffffffffff) 00:23:00 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:00 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000140)='./file0\x00', &(0x7f00000000c0)=""/31) dup(r0) 00:23:00 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x82) 00:23:00 executing program 3: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = open$dir(&(0x7f0000000000)='./file0\x00', 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f0000000140)={0x3, 0x80, 0x3f, 0x2, 0x5, 0x80, 0x0, 0xff, 0x2043, 0xe, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, @perf_bp={&(0x7f0000000080), 0x4}, 0x1a8c1, 0x60b, 0x7fff, 0x6, 0x4a, 0x3, 0x3, 0x0, 0xffffffff, 0x0, 0xffffffffffff0000}) getdents64(r0, &(0x7f0000000200)=""/188, 0xbc) 00:23:00 executing program 7: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000200)={'wlan1\x00', 0x0}) sendmmsg$inet(r0, &(0x7f0000007540)=[{{&(0x7f0000000000)={0x2, 0x0, @initdev={0xac, 0x1e, 0x0, 0x0}}, 0x10, 0x0, 0x0, &(0x7f00000007c0)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r2, @loopback, @multicast1}}}], 0x20}}], 0x1, 0x0) ioctl$sock_inet6_SIOCADDRT(0xffffffffffffffff, 0x890b, &(0x7f0000000200)={@empty, @private2, @empty, 0x3, 0x9, 0x7, 0x100, 0x4, 0x2080222, r2}) r3 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000001c0)=0x0) perf_event_open(&(0x7f0000000140)={0xeb6582a19b1d8a8f, 0x80, 0x4, 0x3, 0x20, 0x63, 0x0, 0x40, 0x0, 0xe, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x4, @perf_config_ext={0x1ff, 0x2}, 0x0, 0xffffffff, 0x3, 0x8, 0x5, 0x7, 0x101, 0x0, 0x6, 0x0, 0xffffffff}, r4, 0x4, r3, 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:00 executing program 2: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, @perf_config_ext, 0x42003}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_devices(0xffffffffffffffff, 0x0, 0x2, 0x0) ppoll(&(0x7f0000000040)=[{r0, 0x2006}, {r1, 0x2011}], 0x2, &(0x7f0000000080)={0x77359400}, &(0x7f00000000c0)={[0x8]}, 0x8) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r3 = socket$packet(0x11, 0x3, 0x300) getsockopt$packet_int(r3, 0x107, 0x8, &(0x7f0000000080), &(0x7f00000000c0)=0x4) syncfs(r2) r4 = gettid() r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0xffffff83, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) sendmsg$BATADV_CMD_GET_VLAN(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f00000003c0)={&(0x7f00000004c0)=ANY=[@ANYBLOB="a4ddf4ffbec4ce1667ba151866ce267a5dc75c5ea308fae80ea9ee5fa11b616d0b6504196532266de3c65c2aa2a7b01af664f8e465a6d2491384f8dc80e7618c00"/79, @ANYRES16=0x0, @ANYBLOB="01002abd7000fedbdf2510fff5000800390002000000"], 0x1c}}, 0x44) clock_gettime(0x0, &(0x7f0000000140)) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000200)=0x0) rt_tgsigqueueinfo(r4, r6, 0x3f, &(0x7f0000000240)={0x20, 0x9, 0x5}) ppoll(&(0x7f0000000000)=[{r1, 0x8002}, {r5, 0x2c3}], 0x2, &(0x7f0000000300)={0x0, 0x989680}, &(0x7f00000001c0)={[0x4]}, 0x8) 00:23:00 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3c", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:00 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eaf"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:00 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eaf"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:00 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:11 executing program 7: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x83) 00:23:11 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:11 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:11 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3c", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:11 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:11 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) r6 = signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r7) ioctl$PTP_PIN_SETFUNC2(r6, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6, 0x0, 0x9}) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x1, 0xf6, 0x1, 0x6, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1000e9d0, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x1, 0x1cb62c42, 0x2, 0x8, 0x2, 0x242b, 0x0, 0x4, 0x0, 0xff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) 00:23:11 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:11 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3c", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:11 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x84) 00:23:11 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x4, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000140), 0xfb270c611df6a183}, 0x0, 0xfffffffffffffffd, 0x800000, 0x3, 0x80000001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x1) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) dup2(r1, r0) 00:23:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x85) 00:23:22 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:22 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:22 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:22 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe6, 0x0, 0x3, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x6, 0x2}, 0x40180, 0x0, 0x0, 0x0, 0xff, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:22 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) r6 = signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r7) ioctl$PTP_PIN_SETFUNC2(r6, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6, 0x0, 0x9}) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x1, 0xf6, 0x1, 0x6, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1000e9d0, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x1, 0x1cb62c42, 0x2, 0x8, 0x2, 0x242b, 0x0, 0x4, 0x0, 0xff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) 00:23:22 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x86) 00:23:22 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:22 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:22 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eaf"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:22 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:23 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) r6 = signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r7) ioctl$PTP_PIN_SETFUNC2(r6, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6, 0x0, 0x9}) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x1, 0xf6, 0x1, 0x6, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1000e9d0, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x1, 0x1cb62c42, 0x2, 0x8, 0x2, 0x242b, 0x0, 0x4, 0x0, 0xff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) 00:23:23 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x87) 00:23:23 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:23 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eaf"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:23 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:23 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:23 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x644fbfd5b56b764b, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@cachetag={'cachetag', 0x3d, '\\'}}, {@version_9p2000}]}}) 00:23:23 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4008}, 0x0, 0x0, 0xffffffffffffffff, 0x1) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x88) 00:23:34 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:34 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x84ea1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xffff, 0x4b}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:34 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "9b10085495d5f1e0f6f2ac6c8f0f22c54a9dd3d9e4fc77ae2146b08ebd460d8de8b6cef2e25ffef48972ea5b5d7f00bc0515ddf4b73bb9ff21dfc200f9aaf78bbb480c700805da50e33818be92b5b5fd1745a818fb17a4faaebba2f1e943cfb6964adb13ea281e6dd1b60375acb6bc337a4ffb7f7ba6e972d7e641518fb0ee76ae4368ee38dd5b7cab0f1ac842e92f4d61cf612d50aa4c237e72754e2a8a135378239c725a755524a0524ae2903d968d6a1ad02eb1e67ede53fd1898e22cb54b8f218717eb4d4859b2d81c1079c2c558cb8335970fef14dfd4ce8ffd467ce3c0fa552b9c22a5617020ce8c8826d868774837dc1ac3b9e9c435129141cec0b98c57c78645fffc3104337a739094d43c14aa2f3783d1f57e68c69c74de4234a24daeaed381d0889bc2ebf411790a2008b045ea464d7cb671ef2715034b40bdb47760ca502d267e58fafc3936f34d32af155830585aced9687bb7e043abcbaf89b800065165356799634f0c06b7f2d17864a47e19609230754ed73f0814dc7c63362a7407ac8aca41f8860035bbf72fdd476fd8a3b8a83a46c5260d3f963c7d41bacc6a83e05557a004ebeb64cee15cd2715babd3ae84b2095cb3616e540921942d867bf59a22d69328f625a6f3d7731a234421b622fb14773efd42507c4b7f85323d4575b348258f98c27b467d50432218963e36376832edce479b918c0d84b30fd8eacced872e4a0f15e982b0c1080ad22d0205c01b09eb49692a8c5ed0251b68e95f2e619dfdff3ca9446ba7073ae131a659f8c57b0c10b61416af53281729b924f7f25fbd65f2bcdc147d13239c91b4aa99503d6c073268a6ab0f9f45bebb4b256185ee30c0ba5f6d634dd3baee75d455d3e03662ad15baaaff9bc3fe005e611b7370fcc09125fec0c19a6693dc39684c0869bfe743c962d749012f66efba988f7b48acbe838b29fd3fcbd14cf17b58ff75837ff7fa514ebf8ddc4e12b01369bc37bebed7a21fdb12b7d71b0ac5550f7d82fa70410b486a0e387635a3c6eac866ac0feeff5691234d180a93657bcde7019f72c55d94490d0a38c9700863969a3c32b190acbe578e21917e21c9a3111d2aa9187ed4050d9d0c2e8265dd77549af3b419f10d64639d22853a0520967ee7eb1ff73e51b1ddd30a3941b123ebfadc86d2f51b6bdc7c3084a19ed62b918e71f10012b619a72928cf6d554bd3dc29e87b30de4f399e0b66e21a3ba47481d3667b5de456e4ae2980fbe2418f085d3b23822855b0befe7000afbb79a6e306b0a44b61c1ecb331804c13c30cdb24485499329d358f3e403ec59c0e3c4f61160413c9e8d6178627fe420a41eb9780d6aa7b5f50dbb8e6905ea05bc645cf1f8a15b8e7d69751ef4cf1f71a1bcbb3986dfc7f84842f853b8304ce6b44f36e65800d59a00a65b729451cb8308dae4611a6359a51857fc81dfd9934f96f06abcddad5f14510e13543b61a0af08fe588435ed198991f443b54682e04c3b22159d9f79b99bbaad7150685a260e072018585a6c8bb2c61d33f64e14a9f4e50b692f44504911abd095e4d59aac3cb162dac5adfa1675cbeee99e463b63f11511e1754deae56eb81f1fa5925e875906f780cca8feabdc5a9bf8154e3ead3c4668949c9e98fe27c7beed1bdcfb484175f0fa1bd0dbfd49b3dc17e51a5ee5c6090d72f77b5fdfe3282dba29671a8e470acad810d1d6129744ed606d841866ca55714a686f5aaff4f40873d66fc4b08a0f68943cf7eeb302b57d258e2144ab1b8b5825f90d1d54987ed4417c904e5db176d735a5d1f199cd5e9b7233bb46f19f8fc5efb388cff3410d40476c26e4c59c2d6bd195ce044922904cfb8d863922dc1c7abef4d986d4e1a949086479dd33c3c3ae8c51fc3c00245ca99d66b97a8f078eb066700538dca5b9e2730d4adee54d718c1bef68be040c3cc4db61da4e8cb544a38f7506bfdcb11753cc39ff101c26d94b7fb8fa878a20b0473fe5ebcc30afbcb7599a34877d5dcbce8113331b6f40c0618ac34c4c516b472965aae3aff3826b6353b324c7eb1d5aef4da257bcebdc9b6dcab0ca19d782e10d21540a2d88bfeac502203e083dd8759a4bbb401c1824ee7e71d03c1192d28a5f1463bd6fdfbc3199c6d4a80233792ec43858a63615e75c590a6a7e46a08e7bd7c825708c982ea54bcd4706133e285ac013d4b39f6795ae394dfd1e2085f85eb8deb07200ea71f07a5dda372992b68c055be05ca5aac488d7b435c4a18f1d34a1acb094b6b3f8030a84d462c1d610dab82c21c8850d97d2731170d35eedf4fda66442e6de2e7c3dec48e99cc7d2551a502916c38afd85b39d27b55220496ea55b0912ccdf6c5758fee90f32a41334de2197984011da47cfd50fb406b04a337b0fc4cf27dd00545c2990cf23855e0d3bed0e4b459fdcb4f5462901ad3b3da6fc348d93edcbadf0fe8cd3189bbf788fa200b2b3b281768fa77b91ab2ed9d488646dbf99e9fd586e9d830b10693a495a81776ae15f05b155ad3ba5a7a0a55bf74536b952b78bfc2ef4cf5085ba4e29c8ac35f13f400ec3a2e97d5caf1d28ba8305cb2d97fd1a59cd16f891ad57be2579f0c29f3e85328ae9ea84b755c8fa3c4823a1838d3507b1362cbec0b143294a0de1861e3cfee2783adf38a056d5fc9f24ac4cfbd778ba148d5dc226aa40d6afeb3535129b27bc6a4be81f7206fdd5ea62a205edaf5ff6571a006292014c3711e2b7adbf82fff0a32ff5e540d54b32c87fde6b985112cf2968f8364514ecd355f425ee1d0f9e0d2a81d07818f98d27919ac2174ed889c255215874bb3fc189ec450ac87e7ca3f9f2874c7e45dda015e038d6d1f6ae8ff3213336f105c6329c37a056f570e2a5494e18d01856575cba959083e7224e8142881cb900feda6f9bb2a6d692e9111f9368978cbf701a9f91d11ad5dd8a0b5cc8cebe77fbad9aa74af1201d51767db4053f484b88c8ddceea90bfd905265c9e54eecc83b1596f57fc635b1c6c0a29b34aef1d8f27193ef7f3a7b5d5b9bb9eb997111d769c8fa67a1424f9e4c021af76e04fc2b6abcf44dac6cf0ea403e5949c122e5ac635f9b920808c6667fde63a44facaefe1b49856a2cb444694546e4439a3f8a62a7ac9b3a71143a3280a9d50d610570bdc19b72873dac853aa9a30f3edcc89587e1961a5b15f8cabeaeb2e1263874808ce703a1d500af891a003db3b5c00515b86258d7871c34abe6a7e6a36c05a3af11846a50c867cdfa2a02bb498bfb59daa4260e779ecbac7d17d822267ee6df78d52e202ac059d42aeeb5426c6dccd9467146fd81bda1811731b98813c8cd358662a0996cc648bd3658dcceb506b0c73cccb569932181845123733f675525faa9c082958fa04b3f3b891d5cec1b5bf79d3ecdfacd38d21cc53ebd6e8fb9d8d39fa9ad33b9cdf24973ab512581ec9c0ad56cb584917030040cfd133326ac7270c18ef7d9bb2b35cd8b017fb8b1b320630e79eb265eb8ffcc935dca2915d36b1eec7eedad1afb04645ffe013d2161afa9db4de02b3f7ff13c60d88bd2568b058087177e0206f7babb22ea1c89a7e08baa1487b5071764461fda04f5f86cb3bff304730d70ac8ab4a332929f2cf7cf5e9b323275d5b91efec710590bd2b52a5da377e125b5a64a17e4589e8bc6abc2a339f5ff21e11d425f1e24d6759d0dac0df44e0d55a3d7821ca40f8551237113fbe069f672fcfc9589c3c2a5b0ebf90a9a92543e511adf5ecada8c8f9598287c7ea6c639cf703b885b75aca4b7ae6de651e46f6936cfa3c656e3ca22175d235b45c3ba1e6386de2d7c044b48c3b801c13f918f8ef8436180193b019d4f78fd0cfb5f39fca38dcf3bf16b7f52c12254e662123c00eb7f16ddf27b2aeff88314ae447df55646e814bb3d5403ab001c358f66abd54509d478ecece126a016e41c17aeea2cea761a940f008022a2c97f2ef78c39a830d13b7243198b88204ada3c07f24a56ac20a8ab1e9feed6b23c753a59d5ce59f3cde85cf6cb8301b9fc1b1191f3f32a59773f11bc42e2a207506dece33723c5dc02c2b71df1e83824142952ceb122acb0662d2bf3b7c88bb66cf48f77b6abf2ed61c3c4646384eec461fa77f46474367a4cc9b8aa0a47f165b2bb160f5bf67cf45af930955c856362e7231c39c09856b666b78d44486e1583ab2b25f190cc255bb8cf4d26ebb25d281779bfb2897c5e44f88c64e2056a5f75dcb7cd2207a41fbc92332e1a7a2df49cafae3db0dd005009fbb8b8e8fab7bae75d873dec82e426a38900b50605b00054d18108d19a3c188bca9b45a9f1f9df39d43d918e886f7924c43245cadc8c81a25a7b334f5b9ab394572ff3710fade853495faea825dec9435a3aa3b082feecd7f05dd7ea02b01b3a1f0d684e332b5b8d8b52a716127a0ba95b7d37cb7764ccbf91f84e788d4cab7be41a26fe3cccec2e1d81dc12c1b595ba2113b8df96e95a2be364c4ed13e8dd67c31be2c22c73ddfa971625d598db565c2ff313d08e63e67d2c5d7eb94851f69ed6773b90b3805cd9fff4cf292e0ea6ac5a3e3aa9e957f366a61c3e21d2fac39857b565d6eaae580d1311835944ddbbaf5ed7ea2fbc91faf40e05344cc9cddeee2ccdbb898f27d2ac4a1c958f944d6a87d99e7e0eccc4dad14481e382b03c028a29682e320b51f9c30dd243486329ca11ce2b1b5ee4f2962eb2d14a8ceec16c1cb2936e37355bdf43c4af619661979b9e136d0de6ec399ce0d65d0ef3251b340f2b6ff6e10486a9edf325ed3d96d8f5250f98fa543059cc7272a86a55013e6582c4f08d384b9a06963fc0f0dab2367c7cb7575d4089c5ec37085a88ce5c1762b662cc3157ce6c9c97a01ebd99bc6cdcab4f1f12ad462e2cda16a8a818c9c335cd9b41af55b2316b37ea1941b5dd0d2df9608d952d79eca5700252c2814cdbbf0cd98531f171740d5f5b3694f4ccc4e7245c1c1ac95bd873b9088b05e8ce7b5707791782f577aef7acb02414904246c239e85d63180ff389b9d067555528eb04d13e66e3c67ce24785fd6a72744fd597bb5a768f19e56879113ccd85ccc4c16dc29d330e21c8446873e680f451310d7dfe4fe0aee9642af88ef1025f3f96b2a19656cb55089ea621f968134a90d74cbebe10e176fb9104db7a6ffcf78779ae63bfc05441eb4e0f92a0b00336f2c47a6329b509bb69c5cd3d6111720f4b7565cbd3acaac86ded72183596b702aead255bbcf0067db456bb448df57708c049d8a6fbb9b86e45d9a1bcb82cbdbeba93d46d904bd30c27ba7ff0fc303991cf0188891213878bd2f9661ac3f1df648337e295e11f9165c7dbcc9ff1c41f24a7ddaa2baa403edf463c39d20ad02d609ec324d787fb8ce710595d2b23092fde5ce139e498b123ed17996ccd89ada0918464ce975e0f780fcd1e6f48eea23c8b446e126eef70c04d79c73d768d22c027caaa7f71cc9a8862cbb3c33876781bccbd1f10fca9cc0b6a3e1036d642ab8792f48d00397a35d5d922cc7878657a4b96facddad6e8273e13814c8bc8e84db3445bb144bf32ebdcb226dee43e4572fa9024b4309615bd2341f0c5a4110111730871e21004df40ba91b5a78953ef93a4aa28cae235872be6e7813a00a838b3e3b59e983efdb594b30d9e9ea5142e609712bff9f8573181d80b58c2c1152fbd201343067e04406970c81597e59d231d7aaec09b9998f7ae51e933347863400f81b8e014ba567bca52eb25756913e8b379452a61f9f273c8aae29942c495163d4be4bc6a0f32"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) r6 = signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r7) ioctl$PTP_PIN_SETFUNC2(r6, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6, 0x0, 0x9}) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0xfffffffffffffffe) perf_event_open(&(0x7f0000000400)={0x0, 0x80, 0x1, 0xf6, 0x1, 0x6, 0x0, 0x7, 0x0, 0x5, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1000e9d0, 0x4, @perf_bp={&(0x7f0000000340), 0x2}, 0x0, 0x1, 0x1cb62c42, 0x2, 0x8, 0x2, 0x242b, 0x0, 0x4, 0x0, 0xff}, 0xffffffffffffffff, 0x4, 0xffffffffffffffff, 0x8) 00:23:34 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:34 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:23:34 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:34 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:34 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x1) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x9, 0x0, 0x9, 0x0, 0xffff, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x1, @perf_config_ext={0x4, 0x2}, 0x80, 0x7a, 0xa, 0x4, 0x1, 0x0, 0x401, 0x0, 0x1, 0x0, 0x7f}, 0x0, 0x10, r1, 0x8) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x89) 00:23:34 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eaf"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:34 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc058", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:34 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:35 executing program 4: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$HIDIOCGUCODE(r1, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x9, 0x7fffffff, 0xfffffffe, 0x100}) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7f904900, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:23:35 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc058", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:35 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) r6 = signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r7) ioctl$PTP_PIN_SETFUNC2(r6, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6, 0x0, 0x9}) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0xfffffffffffffffe) 00:23:35 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:23:35 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 00:23:47 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:47 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8f) 00:23:47 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000280)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$AUTOFS_DEV_IOCTL_FAIL(r2, 0xc0189377, &(0x7f00000028c0)=ANY=[]) clock_gettime(0x0, &(0x7f0000000200)={0x0, 0x0}) futimesat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', &(0x7f0000000240)={{}, {r3, r4/1000+10000}}) ioctl$PERF_EVENT_IOC_ID(r0, 0x80082407, &(0x7f0000000140)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:23:47 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "9b10085495d5f1e0f6f2ac6c8f0f22c54a9dd3d9e4fc77ae2146b08ebd460d8de8b6cef2e25ffef48972ea5b5d7f00bc0515ddf4b73bb9ff21dfc200f9aaf78bbb480c700805da50e33818be92b5b5fd1745a818fb17a4faaebba2f1e943cfb6964adb13ea281e6dd1b60375acb6bc337a4ffb7f7ba6e972d7e641518fb0ee76ae4368ee38dd5b7cab0f1ac842e92f4d61cf612d50aa4c237e72754e2a8a135378239c725a755524a0524ae2903d968d6a1ad02eb1e67ede53fd1898e22cb54b8f218717eb4d4859b2d81c1079c2c558cb8335970fef14dfd4ce8ffd467ce3c0fa552b9c22a5617020ce8c8826d868774837dc1ac3b9e9c435129141cec0b98c57c78645fffc3104337a739094d43c14aa2f3783d1f57e68c69c74de4234a24daeaed381d0889bc2ebf411790a2008b045ea464d7cb671ef2715034b40bdb47760ca502d267e58fafc3936f34d32af155830585aced9687bb7e043abcbaf89b800065165356799634f0c06b7f2d17864a47e19609230754ed73f0814dc7c63362a7407ac8aca41f8860035bbf72fdd476fd8a3b8a83a46c5260d3f963c7d41bacc6a83e05557a004ebeb64cee15cd2715babd3ae84b2095cb3616e540921942d867bf59a22d69328f625a6f3d7731a234421b622fb14773efd42507c4b7f85323d4575b348258f98c27b467d50432218963e36376832edce479b918c0d84b30fd8eacced872e4a0f15e982b0c1080ad22d0205c01b09eb49692a8c5ed0251b68e95f2e619dfdff3ca9446ba7073ae131a659f8c57b0c10b61416af53281729b924f7f25fbd65f2bcdc147d13239c91b4aa99503d6c073268a6ab0f9f45bebb4b256185ee30c0ba5f6d634dd3baee75d455d3e03662ad15baaaff9bc3fe005e611b7370fcc09125fec0c19a6693dc39684c0869bfe743c962d749012f66efba988f7b48acbe838b29fd3fcbd14cf17b58ff75837ff7fa514ebf8ddc4e12b01369bc37bebed7a21fdb12b7d71b0ac5550f7d82fa70410b486a0e387635a3c6eac866ac0feeff5691234d180a93657bcde7019f72c55d94490d0a38c9700863969a3c32b190acbe578e21917e21c9a3111d2aa9187ed4050d9d0c2e8265dd77549af3b419f10d64639d22853a0520967ee7eb1ff73e51b1ddd30a3941b123ebfadc86d2f51b6bdc7c3084a19ed62b918e71f10012b619a72928cf6d554bd3dc29e87b30de4f399e0b66e21a3ba47481d3667b5de456e4ae2980fbe2418f085d3b23822855b0befe7000afbb79a6e306b0a44b61c1ecb331804c13c30cdb24485499329d358f3e403ec59c0e3c4f61160413c9e8d6178627fe420a41eb9780d6aa7b5f50dbb8e6905ea05bc645cf1f8a15b8e7d69751ef4cf1f71a1bcbb3986dfc7f84842f853b8304ce6b44f36e65800d59a00a65b729451cb8308dae4611a6359a51857fc81dfd9934f96f06abcddad5f14510e13543b61a0af08fe588435ed198991f443b54682e04c3b22159d9f79b99bbaad7150685a260e072018585a6c8bb2c61d33f64e14a9f4e50b692f44504911abd095e4d59aac3cb162dac5adfa1675cbeee99e463b63f11511e1754deae56eb81f1fa5925e875906f780cca8feabdc5a9bf8154e3ead3c4668949c9e98fe27c7beed1bdcfb484175f0fa1bd0dbfd49b3dc17e51a5ee5c6090d72f77b5fdfe3282dba29671a8e470acad810d1d6129744ed606d841866ca55714a686f5aaff4f40873d66fc4b08a0f68943cf7eeb302b57d258e2144ab1b8b5825f90d1d54987ed4417c904e5db176d735a5d1f199cd5e9b7233bb46f19f8fc5efb388cff3410d40476c26e4c59c2d6bd195ce044922904cfb8d863922dc1c7abef4d986d4e1a949086479dd33c3c3ae8c51fc3c00245ca99d66b97a8f078eb066700538dca5b9e2730d4adee54d718c1bef68be040c3cc4db61da4e8cb544a38f7506bfdcb11753cc39ff101c26d94b7fb8fa878a20b0473fe5ebcc30afbcb7599a34877d5dcbce8113331b6f40c0618ac34c4c516b472965aae3aff3826b6353b324c7eb1d5aef4da257bcebdc9b6dcab0ca19d782e10d21540a2d88bfeac502203e083dd8759a4bbb401c1824ee7e71d03c1192d28a5f1463bd6fdfbc3199c6d4a80233792ec43858a63615e75c590a6a7e46a08e7bd7c825708c982ea54bcd4706133e285ac013d4b39f6795ae394dfd1e2085f85eb8deb07200ea71f07a5dda372992b68c055be05ca5aac488d7b435c4a18f1d34a1acb094b6b3f8030a84d462c1d610dab82c21c8850d97d2731170d35eedf4fda66442e6de2e7c3dec48e99cc7d2551a502916c38afd85b39d27b55220496ea55b0912ccdf6c5758fee90f32a41334de2197984011da47cfd50fb406b04a337b0fc4cf27dd00545c2990cf23855e0d3bed0e4b459fdcb4f5462901ad3b3da6fc348d93edcbadf0fe8cd3189bbf788fa200b2b3b281768fa77b91ab2ed9d488646dbf99e9fd586e9d830b10693a495a81776ae15f05b155ad3ba5a7a0a55bf74536b952b78bfc2ef4cf5085ba4e29c8ac35f13f400ec3a2e97d5caf1d28ba8305cb2d97fd1a59cd16f891ad57be2579f0c29f3e85328ae9ea84b755c8fa3c4823a1838d3507b1362cbec0b143294a0de1861e3cfee2783adf38a056d5fc9f24ac4cfbd778ba148d5dc226aa40d6afeb3535129b27bc6a4be81f7206fdd5ea62a205edaf5ff6571a006292014c3711e2b7adbf82fff0a32ff5e540d54b32c87fde6b985112cf2968f8364514ecd355f425ee1d0f9e0d2a81d07818f98d27919ac2174ed889c255215874bb3fc189ec450ac87e7ca3f9f2874c7e45dda015e038d6d1f6ae8ff3213336f105c6329c37a056f570e2a5494e18d01856575cba959083e7224e8142881cb900feda6f9bb2a6d692e9111f9368978cbf701a9f91d11ad5dd8a0b5cc8cebe77fbad9aa74af1201d51767db4053f484b88c8ddceea90bfd905265c9e54eecc83b1596f57fc635b1c6c0a29b34aef1d8f27193ef7f3a7b5d5b9bb9eb997111d769c8fa67a1424f9e4c021af76e04fc2b6abcf44dac6cf0ea403e5949c122e5ac635f9b920808c6667fde63a44facaefe1b49856a2cb444694546e4439a3f8a62a7ac9b3a71143a3280a9d50d610570bdc19b72873dac853aa9a30f3edcc89587e1961a5b15f8cabeaeb2e1263874808ce703a1d500af891a003db3b5c00515b86258d7871c34abe6a7e6a36c05a3af11846a50c867cdfa2a02bb498bfb59daa4260e779ecbac7d17d822267ee6df78d52e202ac059d42aeeb5426c6dccd9467146fd81bda1811731b98813c8cd358662a0996cc648bd3658dcceb506b0c73cccb569932181845123733f675525faa9c082958fa04b3f3b891d5cec1b5bf79d3ecdfacd38d21cc53ebd6e8fb9d8d39fa9ad33b9cdf24973ab512581ec9c0ad56cb584917030040cfd133326ac7270c18ef7d9bb2b35cd8b017fb8b1b320630e79eb265eb8ffcc935dca2915d36b1eec7eedad1afb04645ffe013d2161afa9db4de02b3f7ff13c60d88bd2568b058087177e0206f7babb22ea1c89a7e08baa1487b5071764461fda04f5f86cb3bff304730d70ac8ab4a332929f2cf7cf5e9b323275d5b91efec710590bd2b52a5da377e125b5a64a17e4589e8bc6abc2a339f5ff21e11d425f1e24d6759d0dac0df44e0d55a3d7821ca40f8551237113fbe069f672fcfc9589c3c2a5b0ebf90a9a92543e511adf5ecada8c8f9598287c7ea6c639cf703b885b75aca4b7ae6de651e46f6936cfa3c656e3ca22175d235b45c3ba1e6386de2d7c044b48c3b801c13f918f8ef8436180193b019d4f78fd0cfb5f39fca38dcf3bf16b7f52c12254e662123c00eb7f16ddf27b2aeff88314ae447df55646e814bb3d5403ab001c358f66abd54509d478ecece126a016e41c17aeea2cea761a940f008022a2c97f2ef78c39a830d13b7243198b88204ada3c07f24a56ac20a8ab1e9feed6b23c753a59d5ce59f3cde85cf6cb8301b9fc1b1191f3f32a59773f11bc42e2a207506dece33723c5dc02c2b71df1e83824142952ceb122acb0662d2bf3b7c88bb66cf48f77b6abf2ed61c3c4646384eec461fa77f46474367a4cc9b8aa0a47f165b2bb160f5bf67cf45af930955c856362e7231c39c09856b666b78d44486e1583ab2b25f190cc255bb8cf4d26ebb25d281779bfb2897c5e44f88c64e2056a5f75dcb7cd2207a41fbc92332e1a7a2df49cafae3db0dd005009fbb8b8e8fab7bae75d873dec82e426a38900b50605b00054d18108d19a3c188bca9b45a9f1f9df39d43d918e886f7924c43245cadc8c81a25a7b334f5b9ab394572ff3710fade853495faea825dec9435a3aa3b082feecd7f05dd7ea02b01b3a1f0d684e332b5b8d8b52a716127a0ba95b7d37cb7764ccbf91f84e788d4cab7be41a26fe3cccec2e1d81dc12c1b595ba2113b8df96e95a2be364c4ed13e8dd67c31be2c22c73ddfa971625d598db565c2ff313d08e63e67d2c5d7eb94851f69ed6773b90b3805cd9fff4cf292e0ea6ac5a3e3aa9e957f366a61c3e21d2fac39857b565d6eaae580d1311835944ddbbaf5ed7ea2fbc91faf40e05344cc9cddeee2ccdbb898f27d2ac4a1c958f944d6a87d99e7e0eccc4dad14481e382b03c028a29682e320b51f9c30dd243486329ca11ce2b1b5ee4f2962eb2d14a8ceec16c1cb2936e37355bdf43c4af619661979b9e136d0de6ec399ce0d65d0ef3251b340f2b6ff6e10486a9edf325ed3d96d8f5250f98fa543059cc7272a86a55013e6582c4f08d384b9a06963fc0f0dab2367c7cb7575d4089c5ec37085a88ce5c1762b662cc3157ce6c9c97a01ebd99bc6cdcab4f1f12ad462e2cda16a8a818c9c335cd9b41af55b2316b37ea1941b5dd0d2df9608d952d79eca5700252c2814cdbbf0cd98531f171740d5f5b3694f4ccc4e7245c1c1ac95bd873b9088b05e8ce7b5707791782f577aef7acb02414904246c239e85d63180ff389b9d067555528eb04d13e66e3c67ce24785fd6a72744fd597bb5a768f19e56879113ccd85ccc4c16dc29d330e21c8446873e680f451310d7dfe4fe0aee9642af88ef1025f3f96b2a19656cb55089ea621f968134a90d74cbebe10e176fb9104db7a6ffcf78779ae63bfc05441eb4e0f92a0b00336f2c47a6329b509bb69c5cd3d6111720f4b7565cbd3acaac86ded72183596b702aead255bbcf0067db456bb448df57708c049d8a6fbb9b86e45d9a1bcb82cbdbeba93d46d904bd30c27ba7ff0fc303991cf0188891213878bd2f9661ac3f1df648337e295e11f9165c7dbcc9ff1c41f24a7ddaa2baa403edf463c39d20ad02d609ec324d787fb8ce710595d2b23092fde5ce139e498b123ed17996ccd89ada0918464ce975e0f780fcd1e6f48eea23c8b446e126eef70c04d79c73d768d22c027caaa7f71cc9a8862cbb3c33876781bccbd1f10fca9cc0b6a3e1036d642ab8792f48d00397a35d5d922cc7878657a4b96facddad6e8273e13814c8bc8e84db3445bb144bf32ebdcb226dee43e4572fa9024b4309615bd2341f0c5a4110111730871e21004df40ba91b5a78953ef93a4aa28cae235872be6e7813a00a838b3e3b59e983efdb594b30d9e9ea5142e609712bff9f8573181d80b58c2c1152fbd201343067e04406970c81597e59d231d7aaec09b9998f7ae51e933347863400f81b8e014ba567bca52eb25756913e8b379452a61f9f273c8aae29942c495163d4be4bc6a0f32"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) r6 = signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r7) ioctl$PTP_PIN_SETFUNC2(r6, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6, 0x0, 0x9}) 00:23:47 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc058", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:47 executing program 4: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) r2 = perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$HIDIOCGUCODE(r1, 0xc018480d, &(0x7f0000000080)={0x3, 0xffffffff, 0x9, 0x7fffffff, 0xfffffffe, 0x100}) ioctl$BTRFS_IOC_SYNC(r2, 0x9408, 0x0) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000005880)={0x7f904900, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) 00:23:47 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:23:47 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, 0x0, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:23:47 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x300) 00:23:47 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) copy_file_range(r1, &(0x7f0000000140)=0x8, r3, &(0x7f0000000180)=0xb4a6, 0x0, 0x0) 00:23:48 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r6 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r6) 00:23:59 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:23:59 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:23:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 00:23:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x500) 00:23:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) copy_file_range(r1, &(0x7f0000000140)=0x8, r3, &(0x7f0000000180)=0xb4a6, 0x0, 0x0) 00:23:59 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:23:59 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4004}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0xfffffffffffffff8) 00:23:59 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "9b10085495d5f1e0f6f2ac6c8f0f22c54a9dd3d9e4fc77ae2146b08ebd460d8de8b6cef2e25ffef48972ea5b5d7f00bc0515ddf4b73bb9ff21dfc200f9aaf78bbb480c700805da50e33818be92b5b5fd1745a818fb17a4faaebba2f1e943cfb6964adb13ea281e6dd1b60375acb6bc337a4ffb7f7ba6e972d7e641518fb0ee76ae4368ee38dd5b7cab0f1ac842e92f4d61cf612d50aa4c237e72754e2a8a135378239c725a755524a0524ae2903d968d6a1ad02eb1e67ede53fd1898e22cb54b8f218717eb4d4859b2d81c1079c2c558cb8335970fef14dfd4ce8ffd467ce3c0fa552b9c22a5617020ce8c8826d868774837dc1ac3b9e9c435129141cec0b98c57c78645fffc3104337a739094d43c14aa2f3783d1f57e68c69c74de4234a24daeaed381d0889bc2ebf411790a2008b045ea464d7cb671ef2715034b40bdb47760ca502d267e58fafc3936f34d32af155830585aced9687bb7e043abcbaf89b800065165356799634f0c06b7f2d17864a47e19609230754ed73f0814dc7c63362a7407ac8aca41f8860035bbf72fdd476fd8a3b8a83a46c5260d3f963c7d41bacc6a83e05557a004ebeb64cee15cd2715babd3ae84b2095cb3616e540921942d867bf59a22d69328f625a6f3d7731a234421b622fb14773efd42507c4b7f85323d4575b348258f98c27b467d50432218963e36376832edce479b918c0d84b30fd8eacced872e4a0f15e982b0c1080ad22d0205c01b09eb49692a8c5ed0251b68e95f2e619dfdff3ca9446ba7073ae131a659f8c57b0c10b61416af53281729b924f7f25fbd65f2bcdc147d13239c91b4aa99503d6c073268a6ab0f9f45bebb4b256185ee30c0ba5f6d634dd3baee75d455d3e03662ad15baaaff9bc3fe005e611b7370fcc09125fec0c19a6693dc39684c0869bfe743c962d749012f66efba988f7b48acbe838b29fd3fcbd14cf17b58ff75837ff7fa514ebf8ddc4e12b01369bc37bebed7a21fdb12b7d71b0ac5550f7d82fa70410b486a0e387635a3c6eac866ac0feeff5691234d180a93657bcde7019f72c55d94490d0a38c9700863969a3c32b190acbe578e21917e21c9a3111d2aa9187ed4050d9d0c2e8265dd77549af3b419f10d64639d22853a0520967ee7eb1ff73e51b1ddd30a3941b123ebfadc86d2f51b6bdc7c3084a19ed62b918e71f10012b619a72928cf6d554bd3dc29e87b30de4f399e0b66e21a3ba47481d3667b5de456e4ae2980fbe2418f085d3b23822855b0befe7000afbb79a6e306b0a44b61c1ecb331804c13c30cdb24485499329d358f3e403ec59c0e3c4f61160413c9e8d6178627fe420a41eb9780d6aa7b5f50dbb8e6905ea05bc645cf1f8a15b8e7d69751ef4cf1f71a1bcbb3986dfc7f84842f853b8304ce6b44f36e65800d59a00a65b729451cb8308dae4611a6359a51857fc81dfd9934f96f06abcddad5f14510e13543b61a0af08fe588435ed198991f443b54682e04c3b22159d9f79b99bbaad7150685a260e072018585a6c8bb2c61d33f64e14a9f4e50b692f44504911abd095e4d59aac3cb162dac5adfa1675cbeee99e463b63f11511e1754deae56eb81f1fa5925e875906f780cca8feabdc5a9bf8154e3ead3c4668949c9e98fe27c7beed1bdcfb484175f0fa1bd0dbfd49b3dc17e51a5ee5c6090d72f77b5fdfe3282dba29671a8e470acad810d1d6129744ed606d841866ca55714a686f5aaff4f40873d66fc4b08a0f68943cf7eeb302b57d258e2144ab1b8b5825f90d1d54987ed4417c904e5db176d735a5d1f199cd5e9b7233bb46f19f8fc5efb388cff3410d40476c26e4c59c2d6bd195ce044922904cfb8d863922dc1c7abef4d986d4e1a949086479dd33c3c3ae8c51fc3c00245ca99d66b97a8f078eb066700538dca5b9e2730d4adee54d718c1bef68be040c3cc4db61da4e8cb544a38f7506bfdcb11753cc39ff101c26d94b7fb8fa878a20b0473fe5ebcc30afbcb7599a34877d5dcbce8113331b6f40c0618ac34c4c516b472965aae3aff3826b6353b324c7eb1d5aef4da257bcebdc9b6dcab0ca19d782e10d21540a2d88bfeac502203e083dd8759a4bbb401c1824ee7e71d03c1192d28a5f1463bd6fdfbc3199c6d4a80233792ec43858a63615e75c590a6a7e46a08e7bd7c825708c982ea54bcd4706133e285ac013d4b39f6795ae394dfd1e2085f85eb8deb07200ea71f07a5dda372992b68c055be05ca5aac488d7b435c4a18f1d34a1acb094b6b3f8030a84d462c1d610dab82c21c8850d97d2731170d35eedf4fda66442e6de2e7c3dec48e99cc7d2551a502916c38afd85b39d27b55220496ea55b0912ccdf6c5758fee90f32a41334de2197984011da47cfd50fb406b04a337b0fc4cf27dd00545c2990cf23855e0d3bed0e4b459fdcb4f5462901ad3b3da6fc348d93edcbadf0fe8cd3189bbf788fa200b2b3b281768fa77b91ab2ed9d488646dbf99e9fd586e9d830b10693a495a81776ae15f05b155ad3ba5a7a0a55bf74536b952b78bfc2ef4cf5085ba4e29c8ac35f13f400ec3a2e97d5caf1d28ba8305cb2d97fd1a59cd16f891ad57be2579f0c29f3e85328ae9ea84b755c8fa3c4823a1838d3507b1362cbec0b143294a0de1861e3cfee2783adf38a056d5fc9f24ac4cfbd778ba148d5dc226aa40d6afeb3535129b27bc6a4be81f7206fdd5ea62a205edaf5ff6571a006292014c3711e2b7adbf82fff0a32ff5e540d54b32c87fde6b985112cf2968f8364514ecd355f425ee1d0f9e0d2a81d07818f98d27919ac2174ed889c255215874bb3fc189ec450ac87e7ca3f9f2874c7e45dda015e038d6d1f6ae8ff3213336f105c6329c37a056f570e2a5494e18d01856575cba959083e7224e8142881cb900feda6f9bb2a6d692e9111f9368978cbf701a9f91d11ad5dd8a0b5cc8cebe77fbad9aa74af1201d51767db4053f484b88c8ddceea90bfd905265c9e54eecc83b1596f57fc635b1c6c0a29b34aef1d8f27193ef7f3a7b5d5b9bb9eb997111d769c8fa67a1424f9e4c021af76e04fc2b6abcf44dac6cf0ea403e5949c122e5ac635f9b920808c6667fde63a44facaefe1b49856a2cb444694546e4439a3f8a62a7ac9b3a71143a3280a9d50d610570bdc19b72873dac853aa9a30f3edcc89587e1961a5b15f8cabeaeb2e1263874808ce703a1d500af891a003db3b5c00515b86258d7871c34abe6a7e6a36c05a3af11846a50c867cdfa2a02bb498bfb59daa4260e779ecbac7d17d822267ee6df78d52e202ac059d42aeeb5426c6dccd9467146fd81bda1811731b98813c8cd358662a0996cc648bd3658dcceb506b0c73cccb569932181845123733f675525faa9c082958fa04b3f3b891d5cec1b5bf79d3ecdfacd38d21cc53ebd6e8fb9d8d39fa9ad33b9cdf24973ab512581ec9c0ad56cb584917030040cfd133326ac7270c18ef7d9bb2b35cd8b017fb8b1b320630e79eb265eb8ffcc935dca2915d36b1eec7eedad1afb04645ffe013d2161afa9db4de02b3f7ff13c60d88bd2568b058087177e0206f7babb22ea1c89a7e08baa1487b5071764461fda04f5f86cb3bff304730d70ac8ab4a332929f2cf7cf5e9b323275d5b91efec710590bd2b52a5da377e125b5a64a17e4589e8bc6abc2a339f5ff21e11d425f1e24d6759d0dac0df44e0d55a3d7821ca40f8551237113fbe069f672fcfc9589c3c2a5b0ebf90a9a92543e511adf5ecada8c8f9598287c7ea6c639cf703b885b75aca4b7ae6de651e46f6936cfa3c656e3ca22175d235b45c3ba1e6386de2d7c044b48c3b801c13f918f8ef8436180193b019d4f78fd0cfb5f39fca38dcf3bf16b7f52c12254e662123c00eb7f16ddf27b2aeff88314ae447df55646e814bb3d5403ab001c358f66abd54509d478ecece126a016e41c17aeea2cea761a940f008022a2c97f2ef78c39a830d13b7243198b88204ada3c07f24a56ac20a8ab1e9feed6b23c753a59d5ce59f3cde85cf6cb8301b9fc1b1191f3f32a59773f11bc42e2a207506dece33723c5dc02c2b71df1e83824142952ceb122acb0662d2bf3b7c88bb66cf48f77b6abf2ed61c3c4646384eec461fa77f46474367a4cc9b8aa0a47f165b2bb160f5bf67cf45af930955c856362e7231c39c09856b666b78d44486e1583ab2b25f190cc255bb8cf4d26ebb25d281779bfb2897c5e44f88c64e2056a5f75dcb7cd2207a41fbc92332e1a7a2df49cafae3db0dd005009fbb8b8e8fab7bae75d873dec82e426a38900b50605b00054d18108d19a3c188bca9b45a9f1f9df39d43d918e886f7924c43245cadc8c81a25a7b334f5b9ab394572ff3710fade853495faea825dec9435a3aa3b082feecd7f05dd7ea02b01b3a1f0d684e332b5b8d8b52a716127a0ba95b7d37cb7764ccbf91f84e788d4cab7be41a26fe3cccec2e1d81dc12c1b595ba2113b8df96e95a2be364c4ed13e8dd67c31be2c22c73ddfa971625d598db565c2ff313d08e63e67d2c5d7eb94851f69ed6773b90b3805cd9fff4cf292e0ea6ac5a3e3aa9e957f366a61c3e21d2fac39857b565d6eaae580d1311835944ddbbaf5ed7ea2fbc91faf40e05344cc9cddeee2ccdbb898f27d2ac4a1c958f944d6a87d99e7e0eccc4dad14481e382b03c028a29682e320b51f9c30dd243486329ca11ce2b1b5ee4f2962eb2d14a8ceec16c1cb2936e37355bdf43c4af619661979b9e136d0de6ec399ce0d65d0ef3251b340f2b6ff6e10486a9edf325ed3d96d8f5250f98fa543059cc7272a86a55013e6582c4f08d384b9a06963fc0f0dab2367c7cb7575d4089c5ec37085a88ce5c1762b662cc3157ce6c9c97a01ebd99bc6cdcab4f1f12ad462e2cda16a8a818c9c335cd9b41af55b2316b37ea1941b5dd0d2df9608d952d79eca5700252c2814cdbbf0cd98531f171740d5f5b3694f4ccc4e7245c1c1ac95bd873b9088b05e8ce7b5707791782f577aef7acb02414904246c239e85d63180ff389b9d067555528eb04d13e66e3c67ce24785fd6a72744fd597bb5a768f19e56879113ccd85ccc4c16dc29d330e21c8446873e680f451310d7dfe4fe0aee9642af88ef1025f3f96b2a19656cb55089ea621f968134a90d74cbebe10e176fb9104db7a6ffcf78779ae63bfc05441eb4e0f92a0b00336f2c47a6329b509bb69c5cd3d6111720f4b7565cbd3acaac86ded72183596b702aead255bbcf0067db456bb448df57708c049d8a6fbb9b86e45d9a1bcb82cbdbeba93d46d904bd30c27ba7ff0fc303991cf0188891213878bd2f9661ac3f1df648337e295e11f9165c7dbcc9ff1c41f24a7ddaa2baa403edf463c39d20ad02d609ec324d787fb8ce710595d2b23092fde5ce139e498b123ed17996ccd89ada0918464ce975e0f780fcd1e6f48eea23c8b446e126eef70c04d79c73d768d22c027caaa7f71cc9a8862cbb3c33876781bccbd1f10fca9cc0b6a3e1036d642ab8792f48d00397a35d5d922cc7878657a4b96facddad6e8273e13814c8bc8e84db3445bb144bf32ebdcb226dee43e4572fa9024b4309615bd2341f0c5a4110111730871e21004df40ba91b5a78953ef93a4aa28cae235872be6e7813a00a838b3e3b59e983efdb594b30d9e9ea5142e609712bff9f8573181d80b58c2c1152fbd201343067e04406970c81597e59d231d7aaec09b9998f7ae51e933347863400f81b8e014ba567bca52eb25756913e8b379452a61f9f273c8aae29942c495163d4be4bc6a0f32"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) 00:23:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) copy_file_range(r1, &(0x7f0000000140)=0x8, r3, &(0x7f0000000180)=0xb4a6, 0x0, 0x0) 00:23:59 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) copy_file_range(r1, &(0x7f0000000140)=0x8, r3, &(0x7f0000000180)=0xb4a6, 0x0, 0x0) 00:23:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x600) 00:23:59 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) copy_file_range(r1, &(0x7f0000000140)=0x8, r3, &(0x7f0000000180)=0xb4a6, 0x0, 0x0) 00:24:00 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) ioctl$VFAT_IOCTL_READDIR_BOTH(r0, 0x82307201, &(0x7f0000000180)=[{0x0, 0x0, 0x100}, {0x0, 0x0, 0x100}]) 00:24:00 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(0x0) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:00 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:00 executing program 7: r0 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), 0xffffffffffffffff) sendmsg$NL80211_CMD_VENDOR(0xffffffffffffffff, &(0x7f0000000340)={&(0x7f0000000140), 0xc, &(0x7f0000000300)={&(0x7f0000000380)={0x1c, r0, 0x400, 0x70bd27, 0x25dfdbfb, {{}, {@val={0x8, 0x1, 0x4f}, @void, @void}}}, 0x1c}, 0x1, 0x0, 0x0, 0x48080}, 0x10) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) 00:24:11 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:11 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) 00:24:11 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:11 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) sendmsg$unix(r1, &(0x7f00000003c0)={&(0x7f0000000140)=@abs={0x1, 0x0, 0x4e23}, 0x6e, &(0x7f0000000380)=[{&(0x7f00000001c0)="1db24691102dcac658a5039c0d", 0xd}, {&(0x7f0000000200)="c723d5dc670e6cd3f33db7ca5c59b3797a3b20558378b08cea57dd2d7819f5609febb4a08fd96fd021db9fb53c07b9948c014c3f0aa363b0674ddb81f4184f7d47e9d0286a0701a4552feef75dc9d0e49c23fc", 0x53}, {&(0x7f0000000280)="412a5b2511998dcd08e1138d214eae76d3d753444ffc1decb303aa3276e78cab5ff5fbd2e789789a30d4917d1ee219ccd71859bad6fff22646dd3407a95459d21f40e3d86bbf7a890e1d4eaba34d3b9c4b7fbe75f945862ea5e4f9861e731d2dc566", 0x62}, {&(0x7f0000000300)="8a69d8838888de28e6311d0496fb3725251abad7bcc4e560e254cf644e2343a24266890837ae6a7d978133c9596bc570d74ca86abe1341bae6dc96e210aaa406389b47921c3748c17ca3e8bf4eb3a4d9ef0deb91f6aa8d0eaed682ef4a727582ee", 0x61}], 0x4, 0x0, 0x0, 0x8000}, 0x90) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) mount_setattr(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x800, &(0x7f0000000440)={0x200000, 0x100006, 0x0, {r3}}, 0x20) 00:24:11 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x700) 00:24:11 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(0x0) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:11 executing program 4: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) r4 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r5 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r5, r5, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r5, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) r6 = signalfd4(r3, &(0x7f0000000240)={[0x6]}, 0x8, 0x800) r7 = add_key$keyring(&(0x7f00000005c0), &(0x7f0000000600)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffc) add_key(&(0x7f0000000380)='rxrpc_s\x00', &(0x7f0000000480)={'syz', 0x1}, &(0x7f00000004c0)="70e3406a80422ccfa424363057085537ca0b8a89a9513af77e1828a8f5450187eae31c7dda79aa6fe99b8dab0f03e149e4062f247a319af0a6aa00dcbadf91d178e0199c560414fe75cfedc0e6d06595315eb657f9eac69d05b6d280091c1f075c65fafd7b6a465825c5664bc232312fe6f66b0da61bbd33030471b29f2483a75baa96c22f5cc883bb03dd35817489a14568a2e27986157b1834ab6b2e4cfbfebe09d59e5bae3146c4329789d73a5d220c3b3c42d125ff2326a2cd6c89a9d151b1eb32deb587b01a34da20295be6f65688fe2b053fee790659b817", 0xdb, r7) ioctl$PTP_PIN_SETFUNC2(r6, 0x40603d10, &(0x7f0000000280)={'\x00', 0x6, 0x0, 0x9}) ioctl$sock_TIOCOUTQ(r3, 0x5411, 0xfffffffffffffffe) 00:24:11 executing program 2: r0 = syz_open_dev$sg(&(0x7f0000000000), 0x0, 0x201) ioctl$SG_IO(r0, 0x2285, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$SG_SET_RESERVED_SIZE(r2, 0x2275, &(0x7f0000000040)=0x4) 00:24:11 executing program 4: r0 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) pwrite64(r0, &(0x7f0000000000)="8d", 0x1, 0xa42) unlink(&(0x7f00000002c0)='./file0\x00') getxattr(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)=@random={'osx.', '%\x00'}, &(0x7f00000000c0)=""/226, 0xe2) close_range(r0, 0xffffffffffffffff, 0x0) 00:24:11 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e60152", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:11 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x810) 00:24:11 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(0x0) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:11 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x92, 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)="f5ed2ef564e11ade146406a994151151428e2a680845b7af08d28ac74129d980007938dcc0a1521107eae364ccdb9cfbdbc31960bafb76bff780b81c4b4a18a44afff4a2ee98b6ab5b90704f7f97d65f2de7d0cdc984c9aa1a3422a25b669bbb", 0x60, 0x8000}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f94657865632c646f74732c646f733178666c6f7070792c6e6f646fad1eafd3c02fef48b8bb4bdbb843036f74732c646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c646f74732c686173682c736d61636b6673726f6f743d776c616e31002c6f626a5f726f6c653d6e6c3830323131002c736d61636b6673666c6f6f723d776c616e31002c00"]) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf503}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000739bc99a9d7c4f4156298aac00", @ANYRES16=r4, @ANYBLOB="010000000000000000003900000008000300", @ANYRES32=r2, @ANYBLOB="1c005a801800018014000500"/28], 0x38}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x80880) 00:24:11 executing program 2: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x700) 00:24:11 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000180)=ANY=[@ANYBLOB="240000003121080004400000000005000100c5000000"], 0x24}}, 0x0) r1 = openat$full(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendmsg$NFULNL_MSG_CONFIG(r1, 0x0, 0x0) 00:24:11 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "9b10085495d5f1e0f6f2ac6c8f0f22c54a9dd3d9e4fc77ae2146b08ebd460d8de8b6cef2e25ffef48972ea5b5d7f00bc0515ddf4b73bb9ff21dfc200f9aaf78bbb480c700805da50e33818be92b5b5fd1745a818fb17a4faaebba2f1e943cfb6964adb13ea281e6dd1b60375acb6bc337a4ffb7f7ba6e972d7e641518fb0ee76ae4368ee38dd5b7cab0f1ac842e92f4d61cf612d50aa4c237e72754e2a8a135378239c725a755524a0524ae2903d968d6a1ad02eb1e67ede53fd1898e22cb54b8f218717eb4d4859b2d81c1079c2c558cb8335970fef14dfd4ce8ffd467ce3c0fa552b9c22a5617020ce8c8826d868774837dc1ac3b9e9c435129141cec0b98c57c78645fffc3104337a739094d43c14aa2f3783d1f57e68c69c74de4234a24daeaed381d0889bc2ebf411790a2008b045ea464d7cb671ef2715034b40bdb47760ca502d267e58fafc3936f34d32af155830585aced9687bb7e043abcbaf89b800065165356799634f0c06b7f2d17864a47e19609230754ed73f0814dc7c63362a7407ac8aca41f8860035bbf72fdd476fd8a3b8a83a46c5260d3f963c7d41bacc6a83e05557a004ebeb64cee15cd2715babd3ae84b2095cb3616e540921942d867bf59a22d69328f625a6f3d7731a234421b622fb14773efd42507c4b7f85323d4575b348258f98c27b467d50432218963e36376832edce479b918c0d84b30fd8eacced872e4a0f15e982b0c1080ad22d0205c01b09eb49692a8c5ed0251b68e95f2e619dfdff3ca9446ba7073ae131a659f8c57b0c10b61416af53281729b924f7f25fbd65f2bcdc147d13239c91b4aa99503d6c073268a6ab0f9f45bebb4b256185ee30c0ba5f6d634dd3baee75d455d3e03662ad15baaaff9bc3fe005e611b7370fcc09125fec0c19a6693dc39684c0869bfe743c962d749012f66efba988f7b48acbe838b29fd3fcbd14cf17b58ff75837ff7fa514ebf8ddc4e12b01369bc37bebed7a21fdb12b7d71b0ac5550f7d82fa70410b486a0e387635a3c6eac866ac0feeff5691234d180a93657bcde7019f72c55d94490d0a38c9700863969a3c32b190acbe578e21917e21c9a3111d2aa9187ed4050d9d0c2e8265dd77549af3b419f10d64639d22853a0520967ee7eb1ff73e51b1ddd30a3941b123ebfadc86d2f51b6bdc7c3084a19ed62b918e71f10012b619a72928cf6d554bd3dc29e87b30de4f399e0b66e21a3ba47481d3667b5de456e4ae2980fbe2418f085d3b23822855b0befe7000afbb79a6e306b0a44b61c1ecb331804c13c30cdb24485499329d358f3e403ec59c0e3c4f61160413c9e8d6178627fe420a41eb9780d6aa7b5f50dbb8e6905ea05bc645cf1f8a15b8e7d69751ef4cf1f71a1bcbb3986dfc7f84842f853b8304ce6b44f36e65800d59a00a65b729451cb8308dae4611a6359a51857fc81dfd9934f96f06abcddad5f14510e13543b61a0af08fe588435ed198991f443b54682e04c3b22159d9f79b99bbaad7150685a260e072018585a6c8bb2c61d33f64e14a9f4e50b692f44504911abd095e4d59aac3cb162dac5adfa1675cbeee99e463b63f11511e1754deae56eb81f1fa5925e875906f780cca8feabdc5a9bf8154e3ead3c4668949c9e98fe27c7beed1bdcfb484175f0fa1bd0dbfd49b3dc17e51a5ee5c6090d72f77b5fdfe3282dba29671a8e470acad810d1d6129744ed606d841866ca55714a686f5aaff4f40873d66fc4b08a0f68943cf7eeb302b57d258e2144ab1b8b5825f90d1d54987ed4417c904e5db176d735a5d1f199cd5e9b7233bb46f19f8fc5efb388cff3410d40476c26e4c59c2d6bd195ce044922904cfb8d863922dc1c7abef4d986d4e1a949086479dd33c3c3ae8c51fc3c00245ca99d66b97a8f078eb066700538dca5b9e2730d4adee54d718c1bef68be040c3cc4db61da4e8cb544a38f7506bfdcb11753cc39ff101c26d94b7fb8fa878a20b0473fe5ebcc30afbcb7599a34877d5dcbce8113331b6f40c0618ac34c4c516b472965aae3aff3826b6353b324c7eb1d5aef4da257bcebdc9b6dcab0ca19d782e10d21540a2d88bfeac502203e083dd8759a4bbb401c1824ee7e71d03c1192d28a5f1463bd6fdfbc3199c6d4a80233792ec43858a63615e75c590a6a7e46a08e7bd7c825708c982ea54bcd4706133e285ac013d4b39f6795ae394dfd1e2085f85eb8deb07200ea71f07a5dda372992b68c055be05ca5aac488d7b435c4a18f1d34a1acb094b6b3f8030a84d462c1d610dab82c21c8850d97d2731170d35eedf4fda66442e6de2e7c3dec48e99cc7d2551a502916c38afd85b39d27b55220496ea55b0912ccdf6c5758fee90f32a41334de2197984011da47cfd50fb406b04a337b0fc4cf27dd00545c2990cf23855e0d3bed0e4b459fdcb4f5462901ad3b3da6fc348d93edcbadf0fe8cd3189bbf788fa200b2b3b281768fa77b91ab2ed9d488646dbf99e9fd586e9d830b10693a495a81776ae15f05b155ad3ba5a7a0a55bf74536b952b78bfc2ef4cf5085ba4e29c8ac35f13f400ec3a2e97d5caf1d28ba8305cb2d97fd1a59cd16f891ad57be2579f0c29f3e85328ae9ea84b755c8fa3c4823a1838d3507b1362cbec0b143294a0de1861e3cfee2783adf38a056d5fc9f24ac4cfbd778ba148d5dc226aa40d6afeb3535129b27bc6a4be81f7206fdd5ea62a205edaf5ff6571a006292014c3711e2b7adbf82fff0a32ff5e540d54b32c87fde6b985112cf2968f8364514ecd355f425ee1d0f9e0d2a81d07818f98d27919ac2174ed889c255215874bb3fc189ec450ac87e7ca3f9f2874c7e45dda015e038d6d1f6ae8ff3213336f105c6329c37a056f570e2a5494e18d01856575cba959083e7224e8142881cb900feda6f9bb2a6d692e9111f9368978cbf701a9f91d11ad5dd8a0b5cc8cebe77fbad9aa74af1201d51767db4053f484b88c8ddceea90bfd905265c9e54eecc83b1596f57fc635b1c6c0a29b34aef1d8f27193ef7f3a7b5d5b9bb9eb997111d769c8fa67a1424f9e4c021af76e04fc2b6abcf44dac6cf0ea403e5949c122e5ac635f9b920808c6667fde63a44facaefe1b49856a2cb444694546e4439a3f8a62a7ac9b3a71143a3280a9d50d610570bdc19b72873dac853aa9a30f3edcc89587e1961a5b15f8cabeaeb2e1263874808ce703a1d500af891a003db3b5c00515b86258d7871c34abe6a7e6a36c05a3af11846a50c867cdfa2a02bb498bfb59daa4260e779ecbac7d17d822267ee6df78d52e202ac059d42aeeb5426c6dccd9467146fd81bda1811731b98813c8cd358662a0996cc648bd3658dcceb506b0c73cccb569932181845123733f675525faa9c082958fa04b3f3b891d5cec1b5bf79d3ecdfacd38d21cc53ebd6e8fb9d8d39fa9ad33b9cdf24973ab512581ec9c0ad56cb584917030040cfd133326ac7270c18ef7d9bb2b35cd8b017fb8b1b320630e79eb265eb8ffcc935dca2915d36b1eec7eedad1afb04645ffe013d2161afa9db4de02b3f7ff13c60d88bd2568b058087177e0206f7babb22ea1c89a7e08baa1487b5071764461fda04f5f86cb3bff304730d70ac8ab4a332929f2cf7cf5e9b323275d5b91efec710590bd2b52a5da377e125b5a64a17e4589e8bc6abc2a339f5ff21e11d425f1e24d6759d0dac0df44e0d55a3d7821ca40f8551237113fbe069f672fcfc9589c3c2a5b0ebf90a9a92543e511adf5ecada8c8f9598287c7ea6c639cf703b885b75aca4b7ae6de651e46f6936cfa3c656e3ca22175d235b45c3ba1e6386de2d7c044b48c3b801c13f918f8ef8436180193b019d4f78fd0cfb5f39fca38dcf3bf16b7f52c12254e662123c00eb7f16ddf27b2aeff88314ae447df55646e814bb3d5403ab001c358f66abd54509d478ecece126a016e41c17aeea2cea761a940f008022a2c97f2ef78c39a830d13b7243198b88204ada3c07f24a56ac20a8ab1e9feed6b23c753a59d5ce59f3cde85cf6cb8301b9fc1b1191f3f32a59773f11bc42e2a207506dece33723c5dc02c2b71df1e83824142952ceb122acb0662d2bf3b7c88bb66cf48f77b6abf2ed61c3c4646384eec461fa77f46474367a4cc9b8aa0a47f165b2bb160f5bf67cf45af930955c856362e7231c39c09856b666b78d44486e1583ab2b25f190cc255bb8cf4d26ebb25d281779bfb2897c5e44f88c64e2056a5f75dcb7cd2207a41fbc92332e1a7a2df49cafae3db0dd005009fbb8b8e8fab7bae75d873dec82e426a38900b50605b00054d18108d19a3c188bca9b45a9f1f9df39d43d918e886f7924c43245cadc8c81a25a7b334f5b9ab394572ff3710fade853495faea825dec9435a3aa3b082feecd7f05dd7ea02b01b3a1f0d684e332b5b8d8b52a716127a0ba95b7d37cb7764ccbf91f84e788d4cab7be41a26fe3cccec2e1d81dc12c1b595ba2113b8df96e95a2be364c4ed13e8dd67c31be2c22c73ddfa971625d598db565c2ff313d08e63e67d2c5d7eb94851f69ed6773b90b3805cd9fff4cf292e0ea6ac5a3e3aa9e957f366a61c3e21d2fac39857b565d6eaae580d1311835944ddbbaf5ed7ea2fbc91faf40e05344cc9cddeee2ccdbb898f27d2ac4a1c958f944d6a87d99e7e0eccc4dad14481e382b03c028a29682e320b51f9c30dd243486329ca11ce2b1b5ee4f2962eb2d14a8ceec16c1cb2936e37355bdf43c4af619661979b9e136d0de6ec399ce0d65d0ef3251b340f2b6ff6e10486a9edf325ed3d96d8f5250f98fa543059cc7272a86a55013e6582c4f08d384b9a06963fc0f0dab2367c7cb7575d4089c5ec37085a88ce5c1762b662cc3157ce6c9c97a01ebd99bc6cdcab4f1f12ad462e2cda16a8a818c9c335cd9b41af55b2316b37ea1941b5dd0d2df9608d952d79eca5700252c2814cdbbf0cd98531f171740d5f5b3694f4ccc4e7245c1c1ac95bd873b9088b05e8ce7b5707791782f577aef7acb02414904246c239e85d63180ff389b9d067555528eb04d13e66e3c67ce24785fd6a72744fd597bb5a768f19e56879113ccd85ccc4c16dc29d330e21c8446873e680f451310d7dfe4fe0aee9642af88ef1025f3f96b2a19656cb55089ea621f968134a90d74cbebe10e176fb9104db7a6ffcf78779ae63bfc05441eb4e0f92a0b00336f2c47a6329b509bb69c5cd3d6111720f4b7565cbd3acaac86ded72183596b702aead255bbcf0067db456bb448df57708c049d8a6fbb9b86e45d9a1bcb82cbdbeba93d46d904bd30c27ba7ff0fc303991cf0188891213878bd2f9661ac3f1df648337e295e11f9165c7dbcc9ff1c41f24a7ddaa2baa403edf463c39d20ad02d609ec324d787fb8ce710595d2b23092fde5ce139e498b123ed17996ccd89ada0918464ce975e0f780fcd1e6f48eea23c8b446e126eef70c04d79c73d768d22c027caaa7f71cc9a8862cbb3c33876781bccbd1f10fca9cc0b6a3e1036d642ab8792f48d00397a35d5d922cc7878657a4b96facddad6e8273e13814c8bc8e84db3445bb144bf32ebdcb226dee43e4572fa9024b4309615bd2341f0c5a4110111730871e21004df40ba91b5a78953ef93a4aa28cae235872be6e7813a00a838b3e3b59e983efdb594b30d9e9ea5142e609712bff9f8573181d80b58c2c1152fbd201343067e04406970c81597e59d231d7aaec09b9998f7ae51e933347863400f81b8e014ba567bca52eb25756913e8b379452a61f9f273c8aae29942c495163d4be4bc6a0f32"}) r3 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r4 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r4, r4, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r4, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000300)={'bond_slave_0\x00'}) 00:24:11 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:11 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:12 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0xa00) 00:24:21 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:21 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r2, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 00:24:21 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e60152", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:21 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:21 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r3, r3, 0xfffffffffffffff9, 0x0) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r3, &(0x7f0000000640)='trusted\x00', &(0x7f0000000680)) 00:24:21 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x0, 0x0, [0x2, 0x3f, 0x9, 0x2, 0x8000, 0x2], 0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x3, 0x1, 0xffff}, 0x20) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x3, 0x4d, [0x0, 0x5, 0xffffffffffffff6f, 0x80000000, 0x6, 0x3009], 0x2, &(0x7f0000000280)=[{}, {}], &(0x7f00000002c0)=""/77}, &(0x7f00000003c0)=0x78) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = syz_open_dev$usbmon(&(0x7f00000001c0), 0x0, 0x10000) r4 = gettid() r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000240)={0x1, 0x0, &(0x7f0000000200)=[r0, r2, r0, r3, r5]}, 0x5) close_range(r0, 0xffffffffffffffff, 0x0) 00:24:21 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0xb93) 00:24:21 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:24:21 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x1008) 00:24:21 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) r3 = add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) keyctl$KEYCTL_MOVE(0x1e, r3, r3, 0xfffffffffffffff9, 0x0) 00:24:21 executing program 4: setsockopt$EBT_SO_SET_COUNTERS(0xffffffffffffffff, 0x0, 0x81, &(0x7f00000000c0)={'filter\x00', 0x0, 0x0, 0x0, [0x2, 0x3f, 0x9, 0x2, 0x8000, 0x2], 0x7, &(0x7f0000000040)=[{}, {}, {}, {}, {}, {}], 0x0, [{}, {}, {}, {}, {}, {}, {}]}, 0xe8) r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x20, &(0x7f0000000000)={@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01', 0x0, 0x0, 0x3, 0x1, 0xffff}, 0x20) r1 = gettid() r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) getsockopt$EBT_SO_GET_ENTRIES(0xffffffffffffffff, 0x0, 0x81, &(0x7f0000000340)={'filter\x00', 0x0, 0x3, 0x4d, [0x0, 0x5, 0xffffffffffffff6f, 0x80000000, 0x6, 0x3009], 0x2, &(0x7f0000000280)=[{}, {}], &(0x7f00000002c0)=""/77}, &(0x7f00000003c0)=0x78) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = syz_open_dev$usbmon(&(0x7f00000001c0), 0x0, 0x10000) r4 = gettid() r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) io_uring_register$IORING_REGISTER_FILES_UPDATE(r0, 0x6, &(0x7f0000000240)={0x1, 0x0, &(0x7f0000000200)=[r0, r2, r0, r3, r5]}, 0x5) close_range(r0, 0xffffffffffffffff, 0x0) 00:24:21 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:21 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd49c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000280)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) signalfd(r4, &(0x7f0000001900)={[0x409d]}, 0x8) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000680)={r2, "d0e57f5efdd4720d4e7d607882d20cd4"}) r5 = signalfd4(r0, &(0x7f0000000240)={[0x7ff]}, 0x8, 0x800) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000001680)={r1, 0x7f, 0x7, 0x8}) write$binfmt_elf32(r6, &(0x7f00000016c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xff, 0x20, 0xd8, 0x3, 0x2, 0x3, 0x101, 0x16, 0x38, 0x2fc, 0x5, 0xfff9, 0x20, 0x1, 0x3, 0xfe01, 0x200}, [{0x5, 0x3, 0x4, 0xfffffff7, 0x6, 0xffffffff, 0x0, 0x80000001}], "8c5b8309f60c67684b1368434977d810b40162e11ba5dbc15f4149609a51e1a8b4252c4e8d174e2fdf95b83e4e9e803db29c19373372a374d4270a15773cb2086fe9a3ce081b639d1a6411d4c8ad69c815a62a9914f8b15219e571fab4262140657fa4ae43dd0d26ffe3f59f73bd68245a3a4fcbf5b0c92bf09ca6761c9c260bd9b42c7a61e0fde248aa9aa4a917d6b13f46a5c96cba9169b74789f4c357c57629d98febdc5211cd5401e3533a2ee3aae199303bc81e0b76b815642ca87e979011ddb302473eeea0793c272694a09ba5c275fb5099b9576bee89dcea", ['\x00']}, 0x234) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x6b, 0xff, 0x20, 0xf7, 0x0, 0x16828e10, 0x41400, 0x16, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x5}, 0x204, 0x2, 0x37b7, 0xf38c35782b9afbf1, 0x8, 0x90, 0x0, 0x0, 0x100, 0x0, 0xc7db}, 0xffffffffffffffff, 0x10, r5, 0x8) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) sendfile(r0, r7, &(0x7f0000000140)=0x8, 0x7) 00:24:21 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:24:22 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) r2 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) ioctl$BTRFS_IOC_ADD_DEV(0xffffffffffffffff, 0x5000940a, &(0x7f00000008c0)={{r2}, "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"}) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:34 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x2000) 00:24:34 executing program 7: ioctl$FS_IOC_RESVSP(0xffffffffffffffff, 0x40305828, &(0x7f0000000140)={0x0, 0x1, 0x1, 0x3}) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:24:34 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0xff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) pidfd_getfd(r2, r2, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r2, 0xc0502100, &(0x7f0000000180)) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) 00:24:34 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e60152", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:34 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000006c0), 0x1000) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:34 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:34 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x92, 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)="f5ed2ef564e11ade146406a994151151428e2a680845b7af08d28ac74129d980007938dcc0a1521107eae364ccdb9cfbdbc31960bafb76bff780b81c4b4a18a44afff4a2ee98b6ab5b90704f7f97d65f2de7d0cdc984c9aa1a3422a25b669bbb", 0x60, 0x8000}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f94657865632c646f74732c646f733178666c6f7070792c6e6f646fad1eafd3c02fef48b8bb4bdbb843036f74732c646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c646f74732c686173682c736d61636b6673726f6f743d776c616e31002c6f626a5f726f6c653d6e6c3830323131002c736d61636b6673666c6f6f723d776c616e31002c00"]) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf503}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000739bc99a9d7c4f4156298aac00", @ANYRES16=r4, @ANYBLOB="010000000000000000003900000008000300", @ANYRES32=r2, @ANYBLOB="1c005a801800018014000500"/28], 0x38}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x80880) 00:24:34 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f00000003c0)='./file0\x00', 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:34 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd49c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000280)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) signalfd(r4, &(0x7f0000001900)={[0x409d]}, 0x8) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000680)={r2, "d0e57f5efdd4720d4e7d607882d20cd4"}) r5 = signalfd4(r0, &(0x7f0000000240)={[0x7ff]}, 0x8, 0x800) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000001680)={r1, 0x7f, 0x7, 0x8}) write$binfmt_elf32(r6, &(0x7f00000016c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xff, 0x20, 0xd8, 0x3, 0x2, 0x3, 0x101, 0x16, 0x38, 0x2fc, 0x5, 0xfff9, 0x20, 0x1, 0x3, 0xfe01, 0x200}, [{0x5, 0x3, 0x4, 0xfffffff7, 0x6, 0xffffffff, 0x0, 0x80000001}], "8c5b8309f60c67684b1368434977d810b40162e11ba5dbc15f4149609a51e1a8b4252c4e8d174e2fdf95b83e4e9e803db29c19373372a374d4270a15773cb2086fe9a3ce081b639d1a6411d4c8ad69c815a62a9914f8b15219e571fab4262140657fa4ae43dd0d26ffe3f59f73bd68245a3a4fcbf5b0c92bf09ca6761c9c260bd9b42c7a61e0fde248aa9aa4a917d6b13f46a5c96cba9169b74789f4c357c57629d98febdc5211cd5401e3533a2ee3aae199303bc81e0b76b815642ca87e979011ddb302473eeea0793c272694a09ba5c275fb5099b9576bee89dcea", ['\x00']}, 0x234) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x6b, 0xff, 0x20, 0xf7, 0x0, 0x16828e10, 0x41400, 0x16, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x5}, 0x204, 0x2, 0x37b7, 0xf38c35782b9afbf1, 0x8, 0x90, 0x0, 0x0, 0x100, 0x0, 0xc7db}, 0xffffffffffffffff, 0x10, r5, 0x8) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) sendfile(r0, r7, &(0x7f0000000140)=0x8, 0x7) 00:24:34 executing program 7: ioctl$EXT4_IOC_CLEAR_ES_CACHE(0xffffffffffffffff, 0x6628) r0 = getpgrp(0x0) process_vm_writev(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r0, 0x8, &(0x7f0000000300)) fork() r1 = fork() ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000001340)=ANY=[@ANYRESOCT=r1, @ANYRES32=0xffffffffffffffff, @ANYBLOB="02000000000000a2d703dad922334800", @ANYRESHEX, @ANYRESHEX=r1]) ioctl$AUTOFS_DEV_IOCTL_VERSION(r2, 0xc0189371, &(0x7f0000000180)={{0x1, 0x1, 0x18, r2}, './file0\x00'}) ioctl$sock_SIOCGIFVLAN_GET_VLAN_REALDEV_NAME_CMD(r3, 0x8982, &(0x7f00000001c0)={0x8, 'macvlan1\x00', {'wg0\x00'}, 0x3a8}) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0xfc, 0x0, 0x81, 0x0, 0x0, 0x57, 0x40000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xff, 0x100000000}, 0x8, 0x0, 0x80000001, 0x0, 0x2}, 0x0, 0x0, r2, 0x0) getsockopt$IP_VS_SO_GET_TIMEOUT(r3, 0x0, 0x486, &(0x7f0000000300), &(0x7f0000000340)=0xc) r4 = gettid() r5 = syz_open_procfs(r4, &(0x7f0000000140)='net/psched\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$BTRFS_IOC_QGROUP_CREATE(r5, 0x4010942a, &(0x7f0000000200)={0x1}) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:24:34 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x3f00) 00:24:34 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:45 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x4000) 00:24:45 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xd49c}, 0x0, 0x0, 0xffffffffffffffff, 0x8) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$BTRFS_IOC_BALANCE_PROGRESS(r0, 0x84009422, &(0x7f0000000280)={0x0, 0x0, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @usage, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @struct}, {0x0, @struct, 0x0}}) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) signalfd(r4, &(0x7f0000001900)={[0x409d]}, 0x8) ioctl$BTRFS_IOC_DEV_INFO(r1, 0xd000941e, &(0x7f0000000680)={r2, "d0e57f5efdd4720d4e7d607882d20cd4"}) r5 = signalfd4(r0, &(0x7f0000000240)={[0x7ff]}, 0x8, 0x800) ioctl$F2FS_IOC_MOVE_RANGE(r5, 0xc020f509, &(0x7f0000001680)={r1, 0x7f, 0x7, 0x8}) write$binfmt_elf32(r6, &(0x7f00000016c0)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0xff, 0x20, 0xd8, 0x3, 0x2, 0x3, 0x101, 0x16, 0x38, 0x2fc, 0x5, 0xfff9, 0x20, 0x1, 0x3, 0xfe01, 0x200}, [{0x5, 0x3, 0x4, 0xfffffff7, 0x6, 0xffffffff, 0x0, 0x80000001}], "8c5b8309f60c67684b1368434977d810b40162e11ba5dbc15f4149609a51e1a8b4252c4e8d174e2fdf95b83e4e9e803db29c19373372a374d4270a15773cb2086fe9a3ce081b639d1a6411d4c8ad69c815a62a9914f8b15219e571fab4262140657fa4ae43dd0d26ffe3f59f73bd68245a3a4fcbf5b0c92bf09ca6761c9c260bd9b42c7a61e0fde248aa9aa4a917d6b13f46a5c96cba9169b74789f4c357c57629d98febdc5211cd5401e3533a2ee3aae199303bc81e0b76b815642ca87e979011ddb302473eeea0793c272694a09ba5c275fb5099b9576bee89dcea", ['\x00']}, 0x234) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0x6b, 0xff, 0x20, 0xf7, 0x0, 0x16828e10, 0x41400, 0x16, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x2, @perf_bp={&(0x7f0000000180), 0x5}, 0x204, 0x2, 0x37b7, 0xf38c35782b9afbf1, 0x8, 0x90, 0x0, 0x0, 0x100, 0x0, 0xc7db}, 0xffffffffffffffff, 0x10, r5, 0x8) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r7 = openat$rtc(0xffffffffffffff9c, &(0x7f0000000100), 0x40, 0x0) sendfile(r0, r7, &(0x7f0000000140)=0x8, 0x7) 00:24:45 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:45 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:45 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:45 executing program 7: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x2250, 0x0, 0x8, 0x0, 0x0, 0x2, 0x1}, 0x0, 0x0, r1, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:24:45 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:45 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:45 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8100) 00:24:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x92, 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)="f5ed2ef564e11ade146406a994151151428e2a680845b7af08d28ac74129d980007938dcc0a1521107eae364ccdb9cfbdbc31960bafb76bff780b81c4b4a18a44afff4a2ee98b6ab5b90704f7f97d65f2de7d0cdc984c9aa1a3422a25b669bbb", 0x60, 0x8000}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f94657865632c646f74732c646f733178666c6f7070792c6e6f646fad1eafd3c02fef48b8bb4bdbb843036f74732c646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c646f74732c686173682c736d61636b6673726f6f743d776c616e31002c6f626a5f726f6c653d6e6c3830323131002c736d61636b6673666c6f6f723d776c616e31002c00"]) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf503}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000739bc99a9d7c4f4156298aac00", @ANYRES16=r4, @ANYBLOB="010000000000000000003900000008000300", @ANYRES32=r2, @ANYBLOB="1c005a801800018014000500"/28], 0x38}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x80880) 00:24:45 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:45 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x50, 0x0, 0x40}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_mount_image$msdos(&(0x7f0000000080), &(0x7f0000000200)='./file0\x00', 0x0, 0x3, &(0x7f00000003c0)=[{&(0x7f0000000240)="ce2dafb8fae4574a63e0d994c6cb83b63926f99274ea0c03f1b1072680b67dfbcd1ab1da251e546c17ea7ef404fca397ab094da0cb1381a6b6816ab0c30b406040895c0aa80bff570195195c72f923f075f9b8b739830b53025af026d9ea34472849228da9f55585204df19c1b780d78e9671e320e03cb19038cb10b70597243ab9b391b37753021cd3827808beee19d638d0329ac8d2f7001a60f438abfc59851fb181a54", 0xa5}, {&(0x7f0000000300)="a6f087daab70ddb04bd032bb2eb97795231c869e85f4af9d3c3d4982825c47e548f51f3b", 0x24}, {&(0x7f0000000340)="8abc054a47c98df12d9807bc1fd13247b48fd0911c9804b79bdffe6a655b80a885c77d695c4066dcd32fef469131c7d1cb1a3e954ff7f1e8ba10ae36c70108bd6b99fe50324f4d24727f31e455febb", 0x4f, 0xffffffffffffff7f}], 0x4000, &(0x7f0000000440)={[{}, {@dots}, {@fat=@umask={'umask', 0x3d, 0x7}}, {@fat=@fmask={'fmask', 0x3d, 0x73}}, {@fat=@nocase}, {@nodots}], [{@appraise_type}, {@hash}, {@func={'func', 0x3d, 'KEXEC_INITRAMFS_CHECK'}}]}) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = eventfd2(0x800, 0x1) r4 = syz_open_dev$ptys(0xc, 0x3, 0x1) r5 = fsopen(&(0x7f0000000a40)='hfs\x00', 0x0) r6 = eventfd2(0x6, 0x801) r7 = gettid() r8 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r8, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r8, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r7, 0x8, r8, 0x4) sendmsg$AUDIT_TTY_SET(r8, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000003040)=[{{&(0x7f0000000d80)=@abs, 0x6e, &(0x7f0000001140)=[{&(0x7f0000000e00)=""/234, 0xea}, {&(0x7f0000000f00)=""/203, 0xcb}, {&(0x7f0000001000)=""/3, 0x3}, {&(0x7f0000001040)=""/50, 0x32}, {&(0x7f0000001080)=""/150, 0x96}], 0x5, &(0x7f00000011c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000001280), 0x6e, &(0x7f0000001a40)=[{&(0x7f0000001300)=""/191, 0xbf}, {&(0x7f00000013c0)=""/43, 0x2b}, {&(0x7f0000001400)=""/131, 0x83}, {&(0x7f00000014c0)=""/184, 0xb8}, {&(0x7f0000001580)}, {&(0x7f00000015c0)=""/220, 0xdc}, {&(0x7f00000016c0)=""/204, 0xcc}, {&(0x7f00000017c0)=""/247, 0xf7}, {&(0x7f00000018c0)=""/137, 0x89}, {&(0x7f0000001980)=""/190, 0xbe}], 0xa, &(0x7f0000001b00)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x48}}, {{&(0x7f0000001b80)=@abs, 0x6e, &(0x7f0000001e80)=[{&(0x7f0000001c00)=""/167, 0xa7}, {&(0x7f0000001cc0)}, {&(0x7f0000001d00)=""/160, 0xa0}, {&(0x7f0000001dc0)=""/131, 0x83}], 0x4, &(0x7f0000001ec0)=[@cred={{0x1c}}, @rights={{0x10}}, @rights={{0x10}}], 0x40}}, {{&(0x7f0000001f00)=@abs, 0x6e, &(0x7f00000021c0)=[{&(0x7f0000001f80)=""/7, 0x7}, {&(0x7f0000001fc0)=""/140, 0x8c}, {&(0x7f0000002080)=""/52, 0x34}, {&(0x7f00000020c0)=""/99, 0x63}, {&(0x7f0000002140)=""/68, 0x44}], 0x5, &(0x7f0000002240)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x68}}, {{&(0x7f00000022c0)=@abs, 0x6e, &(0x7f0000002440)=[{&(0x7f0000002340)=""/52, 0x34}, {&(0x7f0000002380)=""/165, 0xa5}], 0x2}}, {{&(0x7f0000002480), 0x6e, &(0x7f0000002880)=[{&(0x7f0000002500)=""/212, 0xd4}, {&(0x7f0000002600)=""/100, 0x64}, {&(0x7f0000002680)=""/204, 0xcc}, {&(0x7f0000002780)=""/247, 0xf7}], 0x4, &(0x7f00000028c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}], 0xb0}}, {{&(0x7f0000002980), 0x6e, &(0x7f0000002a40)=[{&(0x7f0000002a00)=""/20, 0x14}], 0x1, &(0x7f0000002a80)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0xf0}}, {{&(0x7f0000002b80), 0x6e, &(0x7f0000002ec0)=[{&(0x7f0000002c00)=""/214, 0xd6}, {&(0x7f0000002d00)=""/12, 0xc}, {&(0x7f0000002d40)=""/59, 0x3b}, {&(0x7f0000002d80)=""/153, 0x99}, {&(0x7f0000002e40)=""/113, 0x71}], 0x5, &(0x7f0000002f40)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0xe8}}], 0x8, 0x2, &(0x7f0000003240)={0x0, 0x989680}) io_submit(0x0, 0xa, &(0x7f0000003340)=[&(0x7f0000000640)={0x0, 0x0, 0x0, 0x7, 0xffff, r2, &(0x7f0000000600)="02371b96a105d164a0f6406a78b4f17b8de621eff854ed77436dd4aac182ed9938333c31ebc6a6d67a23efeaa91ae6ee23f119345fef2964", 0x38, 0x100000, 0x0, 0x3}, &(0x7f0000000780)={0x0, 0x0, 0x0, 0x6, 0x20, r1, &(0x7f0000000680)="36784d0f7ccffee76aaef382b004f866f3c15e8a656d0e241567444fd8d068fc341734d23ed138eae4532fce6974d6b03eace75e3ed463ace0e2914d1701d068d1793753219bb875fe66607a1d8941df5a95765093c1416ed982fd5d3fcadd6ac77206a36cd7e8eb15f4fa6c4ad327ebe5cd3cc1f3e47e1c8477496fa495c4515c03633eea177b809d1eaf366c238a37f36190e8d447f7a5e6b9e01195e37b9e2b9ba9321537f6bbdd2001a850ec32ffb0960c7ad74ca70de862a903deaa46cccc5913645d65a332de5cfd8769997489e65c2c", 0xd3, 0x1, 0x0, 0x3}, &(0x7f0000000840)={0x0, 0x0, 0x0, 0x5, 0x1000, r0, &(0x7f00000007c0)="c2ac6b3cfeb6a6ed9bda7832dec954538b1af9c6fb97047772156c271df47b03cf5b76f95eb9d4ca765fef99f4f2c0a303df4ca9e53a7fb0bf9a19c86f9961e0fb07ef9e0839e1bd4374bd", 0x4b, 0x7fff, 0x0, 0x3, r3}, &(0x7f0000000980)={0x0, 0x0, 0x0, 0x2, 0x9, r0, &(0x7f0000000880)="637e26f35abfbafdb9abc3f4163b4d12aad8f4b2d033aa3db6c46f247aa222c28560f0baca3eb624e3cbc3be36a4fe32c83e38e945d2e0b9ac4436319e82718e2675b7ede38e4f6bf0325f60b91267013313fb9ad6e5d5d9020d635e92c91b54aa762176afedad0456eb6d1b2fed496445cbeaefaddcf3f8fffd7c752546f9fa453fdee4e3009af46342e8785cd6562f5be91662253ee0eca207110241d43117f0e608e69176ff687605c7389cf7f26a4ff88fbc02429cd9b9345bc04b5a73766a39bcf72b2dea130671118e0e921ba753f06759f701b3a166663ff3d871e975fa77178b3ab8fd49358ab1e6300167", 0xef, 0x0, 0x0, 0x1}, &(0x7f0000000a00)={0x0, 0x0, 0x0, 0x5, 0x1, r4, &(0x7f00000009c0)="e6f76c9112db997220c15b77b56b9cecb74f4846833efef83348a678ff628d63cbb72dd1e222fbcbb7d9b231104806ef291eb781", 0x34, 0x7fff}, &(0x7f0000000ac0)={0x0, 0x0, 0x0, 0x7, 0x7fff, r5, &(0x7f0000000a80)="f9b3491773dab03825154d115820c33b4da64a3c3095995077ca9a86b956cb45", 0x20, 0x1, 0x0, 0x1}, &(0x7f0000000b40)={0x0, 0x0, 0x0, 0x7, 0x4000, r1, &(0x7f0000000b00)="bf8bb7640bef6b7f20889f85aa4b3de8ad4b6f1da2bac2e1e1ce550d6f880c4e27b53f1fb5b5fc6862672ca1baf4", 0x2e, 0x3, 0x0, 0x2, r6}, &(0x7f0000000c40)={0x0, 0x0, 0x0, 0x5, 0x81, r2, &(0x7f0000000b80)="cc3408f4c3505314b39a9b91287b34229b9e29216c351c336511c22c0e00cbd0c0ef60f0908e66c7b20f2b9d86b6b6fa49127293e09b47a7bf7b6a0eacbae706bfb4504fd7569449de21d2ab4487e54660ca38cd7cf3ac19701b22a7a4846e901e2eec39355f1028e0e08cc77c048fff0bddef3a635dd789610f6d6673030f7bd8a9e7495c714d5c78ef3a8d62552ab9672fd83d5c92d3c46b49e2942c47494409a6f7dae062da2d651b6ccd8cf57118666cd6f6afb4e88caa6fbdd5c7", 0xbd, 0xfd1, 0x0, 0x3, r8}, &(0x7f0000003280)={0x0, 0x0, 0x0, 0x8, 0x8, r0, &(0x7f0000000c80)="02db0573457e12302c9affabd1ae071131babcf49b9e2f993145b857f592bbab4f35d147fa7b5857f165415c13ed8f4756ab930c47c91d2d0bad1e44f1dc855a589c021089aa63937831c9f852174c4a4a2b034e3b13a5b72df18b6849e24c2a68ea809b5cbd0065e62c136611613b428a1266ed7843574391a313cdb976c550ae18daf6c8aa03d9ad7b8d0eda2ee98ffb7f6760c070f238502d0c7ef17147ec009dc30ca573039576d9fbf10402a85dc44068de5781ac12f5d9ac92668adb1e255b0b8c6ba2c2e999915e2fea8080c4d81d", 0xd2, 0xffffffff, 0x0, 0x7, r9}, &(0x7f0000003300)={0x0, 0x0, 0x0, 0x0, 0x9, r0, &(0x7f00000032c0)="f126be81b3462a829217792764786998c13d36eaaecde5c7e88622", 0x1b, 0x81, 0x0, 0x2}]) perf_event_open(&(0x7f0000000540)={0x5, 0x80, 0x3f, 0x3, 0x8, 0x3f, 0x0, 0x4, 0x1187, 0x7, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp={&(0x7f00000005c0), 0xa}, 0x14, 0x4, 0xffffffff, 0x5, 0x4, 0x80000001, 0x8, 0x0, 0x7, 0x0, 0x10000}, 0xffffffffffffffff, 0xa, r0, 0xb) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000140)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=0xffffffffffffffff, @ANYBLOB="000000000000009cda2e1831002e0073f2a93be9109a7e5f1449cd188a94bd696c653000a8476ab9da299e841e99fe2f75028825d14f84fbfb83a314fd93223c2766f62fdf9d431990898169157601a6c0a0a825e6cfa26b2534b5a67c94a4551fc30e21928e212a6e1150563b724439d21a7f5b4c13999c3bc75058620e6bd8c841e643e623be09"]) mkdirat(r10, &(0x7f00000000c0)='./file0\x00', 0x80) 00:24:45 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x92, 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)="f5ed2ef564e11ade146406a994151151428e2a680845b7af08d28ac74129d980007938dcc0a1521107eae364ccdb9cfbdbc31960bafb76bff780b81c4b4a18a44afff4a2ee98b6ab5b90704f7f97d65f2de7d0cdc984c9aa1a3422a25b669bbb", 0x60, 0x8000}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f94657865632c646f74732c646f733178666c6f7070792c6e6f646fad1eafd3c02fef48b8bb4bdbb843036f74732c646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c646f74732c686173682c736d61636b6673726f6f743d776c616e31002c6f626a5f726f6c653d6e6c3830323131002c736d61636b6673666c6f6f723d776c616e31002c00"]) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf503}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000739bc99a9d7c4f4156298aac00", @ANYRES16=r4, @ANYBLOB="010000000000000000003900000008000300", @ANYRES32=r2, @ANYBLOB="1c005a801800018014000500"/28], 0x38}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x80880) 00:24:46 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:46 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8200) 00:24:46 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:46 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(0xffffffffffffffff, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:46 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) r1 = add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) keyctl$KEYCTL_RESTRICT_KEYRING(0x1d, r1, &(0x7f00000001c0)='logon\x00', &(0x7f0000000200)=@secondary) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:46 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, 0x0, 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:46 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(0x0, 0x0) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:57 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0xa8840, 0x0) mknodat$loop(r0, &(0x7f0000000180)='./file0\x00', 0x0, 0x1) 00:24:57 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8300) 00:24:57 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) add_key$user(&(0x7f0000000000), &(0x7f0000000040)={'syz', 0x2}, &(0x7f0000000100)="4b45e37b07eee777e590a5efd1f90689f05f6839fcbadc7e777673c9ba94c0b1f0afecf269b1be1120245196f33adf8487930f9251456e847c14a9769ad0ead83f5b419f875c2f72300ca6b321e10a12db7eaf3c427fed0b6e99eb579ae6faff8aadb087cfaed7aa3051ec8ef01346a8b4204e7ace6e5c613941c2beba290f46987bf3b804da83f7ea3c844eebd4e03a150c143db074b591ac94a123b7016da0ddf54d293c297ee6d6b0e5c1d46f5ca342775381187637ca89f4479e", 0xbc, 0xfffffffffffffffd) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:57 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:24:57 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(0x0, 0x0) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:57 executing program 2: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffe}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) pipe(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_mount_image$msdos(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x92, 0x1, &(0x7f0000000540)=[{&(0x7f00000004c0)="f5ed2ef564e11ade146406a994151151428e2a680845b7af08d28ac74129d980007938dcc0a1521107eae364ccdb9cfbdbc31960bafb76bff780b81c4b4a18a44afff4a2ee98b6ab5b90704f7f97d65f2de7d0cdc984c9aa1a3422a25b669bbb", 0x60, 0x8000}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB="73686f94657865632c646f74732c646f733178666c6f7070792c6e6f646fad1eafd3c02fef48b8bb4bdbb843036f74732c646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c6e6f646f74732c646f74732c686173682c736d61636b6673726f6f743d776c616e31002c6f626a5f726f6c653d6e6c3830323131002c736d61636b6673666c6f6f723d776c616e31002c00"]) ioctl$sock_SIOCGIFINDEX_80211(r1, 0x8933, &(0x7f00000000c0)={'wlan1\x00', 0x0}) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000400)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x1000}, 0xc, &(0x7f00000003c0)={&(0x7f0000000340)={0x80, 0x0, 0x2, 0x70bd28, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0xf503}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x7}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x57}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x1}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x5}, @IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0xfffffff8}, @IPVS_CMD_ATTR_DEST={0xc, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_U_THRESH={0x8}]}, @IPVS_CMD_ATTR_DEST={0x1c, 0x2, 0x0, 0x1, [@IPVS_DEST_ATTR_INACT_CONNS={0x8, 0x8, 0x2}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x2}, @IPVS_DEST_ATTR_TUN_PORT={0x6, 0xe, 0x4e20}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x4}, @IPVS_CMD_ATTR_DAEMON={0xc, 0x3, 0x0, 0x1, [@IPVS_DAEMON_ATTR_SYNC_ID={0x8, 0x3, 0x1}]}]}, 0x80}, 0x1, 0x0, 0x0, 0x44}, 0x4000000) sendmsg$NL80211_CMD_JOIN_MESH(r3, &(0x7f0000000600)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000280)=ANY=[@ANYBLOB="380000739bc99a9d7c4f4156298aac00", @ANYRES16=r4, @ANYBLOB="010000000000000000003900000008000300", @ANYRES32=r2, @ANYBLOB="1c005a801800018014000500"/28], 0x38}}, 0x0) sendmsg$NL80211_CMD_RELOAD_REGDB(r0, &(0x7f0000000240)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x800}, 0xc, &(0x7f0000000200)={&(0x7f00000001c0)={0x14, r4, 0x300, 0x70bd2b, 0x25dfdbfe, {}, ["", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0xc000}, 0x80880) 00:24:57 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, 0x0, 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:24:57 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x1f, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)={0x51, 0x40, 0x5, {0x141}, {0x43, 0x9}, @cond=[{0x1, 0x6, 0x9, 0x3, 0x8, 0x7f}, {0x0, 0x0, 0x4f44, 0x800, 0x8001}]}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/232) ioctl$EVIOCGEFFECTS(r0, 0x80084504, &(0x7f00000016c0)=""/4096) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) r3 = getpgrp(0x0) process_vm_writev(r3, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r3, 0x8, &(0x7f0000000300)) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r4 = getpid() setpgid(0x0, r4) syz_open_procfs$namespace(r4, &(0x7f00000012c0)='ns/user\x00') perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x1, 0x2, 0x0, 0x7, 0x0, 0xff, 0x20000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x95, 0x2}, 0x44080, 0x2, 0x7f, 0x3, 0x4, 0x8, 0x81, 0x0, 0x9, 0x0, 0x1}, r3, 0x8, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x2, 0xf7, 0x40, 0x1f, 0x0, 0x0, 0x6024, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8d9, 0x0, @perf_config_ext={0x8, 0x7fff}, 0x800, 0x6, 0xfffffff8, 0x1, 0x0, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r2, 0x7) 00:24:57 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(0x0, 0x0) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:57 executing program 3: r0 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x40086806, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:24:58 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(0x0, 0x0) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:24:58 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8400) 00:24:58 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) dup2(0xffffffffffffffff, r1) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) mount$9p_fd(0x0, &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x2000000, &(0x7f0000000200)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@debug={'debug', 0x3d, 0x6}}, {@access_user}, {@access_client}], [{@obj_user={'obj_user', 0x3d, 'net/snmp6\x00'}}, {@seclabel}, {@seclabel}]}}) 00:24:58 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) [ 1209.612913] kernel read not supported for file /80176/net/snmp6 (pid: 36168 comm: kworker/1:2) 00:25:07 executing program 4: r0 = syz_open_dev$evdev(&(0x7f0000000000), 0x1f, 0x0) ioctl$EVIOCSFF(r0, 0x40304580, &(0x7f0000000140)={0x51, 0x40, 0x5, {0x141}, {0x43, 0x9}, @cond=[{0x1, 0x6, 0x9, 0x3, 0x8, 0x7f}, {0x0, 0x0, 0x4f44, 0x800, 0x8001}]}) perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x24, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x10000}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xd, 0xffffffffffffffff, 0x0) ioctl$EVIOCGEFFECTS(r0, 0x80044584, &(0x7f0000000040)=""/232) ioctl$EVIOCGEFFECTS(r0, 0x80084504, &(0x7f00000016c0)=""/4096) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) r3 = getpgrp(0x0) process_vm_writev(r3, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) sched_getaffinity(r3, 0x8, &(0x7f0000000300)) kcmp(0x0, 0x0, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r4 = getpid() setpgid(0x0, r4) syz_open_procfs$namespace(r4, &(0x7f00000012c0)='ns/user\x00') perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0x1, 0x2, 0x0, 0x7, 0x0, 0xff, 0x20000, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x95, 0x2}, 0x44080, 0x2, 0x7f, 0x3, 0x4, 0x8, 0x81, 0x0, 0x9, 0x0, 0x1}, r3, 0x8, 0xffffffffffffffff, 0x0) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x2, 0xf7, 0x40, 0x1f, 0x0, 0x0, 0x6024, 0x9, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8d9, 0x0, @perf_config_ext={0x8, 0x7fff}, 0x800, 0x6, 0xfffffff8, 0x1, 0x0, 0x9, 0x3, 0x0, 0x7ff, 0x0, 0x3}, 0xffffffffffffffff, 0xc, r2, 0x7) 00:25:07 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:07 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8500) 00:25:07 executing program 2: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, 0x0) r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:07 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:07 executing program 3: openat$hpet(0xffffffffffffff9c, &(0x7f0000000140), 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:07 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, 0x0, 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:07 executing program 7: read$ptp(0xffffffffffffffff, &(0x7f0000001100)=""/177, 0xb1) r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = getpgrp(0x0) process_vm_writev(r1, &(0x7f0000000080)=[{&(0x7f0000000000)=""/39, 0x27}], 0x1, &(0x7f0000002480)=[{&(0x7f0000000100)=""/4096, 0x1000}], 0x1, 0x0) ioctl$PERF_EVENT_IOC_REFRESH(r0, 0x2402, 0x100000001) sched_getaffinity(r1, 0x8, &(0x7f0000000300)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x8, 0x7, 0x3, 0x80, 0x0, 0x300000000000, 0x8000, 0xd, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x3, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000140), 0x1}, 0x2820, 0x2, 0x222df3e3, 0x5, 0x4, 0x200, 0x3, 0x0, 0x8}, r1, 0xd, r0, 0x9) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) wait4(r1, &(0x7f00000011c0), 0x8, &(0x7f0000001200)) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:25:07 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:08 executing program 2: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:08 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:08 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:08 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8600) 00:25:18 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) perf_event_open(&(0x7f0000000200)={0x4, 0x80, 0xca, 0x99, 0xc0, 0x77, 0x0, 0x3, 0x8004, 0x9, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x2, @perf_config_ext={0xea4f, 0x1}, 0x4040, 0x0, 0x20, 0x3, 0x9, 0x5, 0x8000, 0x0, 0x7f, 0x0, 0x4}, 0x0, 0xffffffffffffffff, r1, 0x7) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x1, 0x9, 0xff, 0x8, 0x0, 0x588b, 0x180, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x2, @perf_bp={&(0x7f0000000140), 0xe}, 0x42000, 0xffff, 0xfff, 0x6, 0x54, 0x2b8, 0x40, 0x0, 0x0, 0x0, 0x1ff}, 0x0, 0xfffffffffffffffc, r0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:25:18 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:18 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:18 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8700) 00:25:18 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:18 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:18 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:18 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:18 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:18 executing program 3: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:18 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:25:18 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:18 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8800) 00:25:18 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, 0x0, 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:18 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:18 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:18 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8900) 00:25:18 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:28 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:28 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:28 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8f00) 00:25:28 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) fcntl$setownex(r0, 0xf, &(0x7f0000000140)={0x1}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000180)={{0x1, 0x1, 0x18, r0, {0xee00, 0xee01}}, './file0\x00'}) ioctl$AUTOFS_IOC_ASKUMOUNT(r1, 0x80049370, &(0x7f0000000200)) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x400}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:25:28 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:28 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:28 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:29 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x0, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:29 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x5, 0x3}}, 0x0, 0xf, 0xffffffffffffffff, 0x0) r0 = fork() r1 = fork() kcmp(r0, r1, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x69, 0x68, 0x30, 0x7f, 0x0, 0x9, 0x0, 0x8, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xad8, 0x0, @perf_config_ext={0x4, 0x3f}, 0x1200a, 0x1c, 0x1000, 0x0, 0x7fff, 0xb8347fb, 0x5, 0x0, 0x174, 0x0, 0xea3}, r0, 0x10, 0xffffffffffffffff, 0x10) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x9, 0x0, 0x7, 0x91200, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x8, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd29, 0x25dfdbfb, {}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x1}, 0x20040814) r4 = gettid() r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r4, 0x8, r5, 0x4) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x0) fcntl$dupfd(r3, 0x406, r5) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:25:29 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x930b) 00:25:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:29 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(0x0, &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:40 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(0x0, &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:40 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:40 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:40 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x2, 0x5, 0xe2, 0x49, 0x0, 0x5, 0x44a0, 0x4, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0x8, 0x8}, 0x5272, 0x7, 0xaa8, 0x3, 0x8, 0x1, 0x1, 0x0, 0x5d7e, 0x0, 0x7f}, 0xffffffffffffffff, 0x0, r0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = gettid() r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000240)={0x2, 0x80, 0x1, 0x10, 0x0, 0x7, 0x0, 0x7fffffff, 0x4800b, 0x2, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x3, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0xcc60, 0x4, @perf_bp={&(0x7f00000002c0)}, 0x200, 0xfffffffffffffffa, 0x7, 0x0, 0x7, 0x8, 0x0, 0x0, 0x82, 0x0, 0x8}, r2, 0x6, r4, 0x1) r5 = gettid() r6 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r6, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r6, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r5, 0x8, r6, 0x4) sendmsg$AUDIT_TTY_SET(r6, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$LOOP_CTL_REMOVE(r6, 0x4c81, 0x0) perf_event_open(&(0x7f00000001c0)={0x5, 0x80, 0xe, 0x3f, 0x4, 0x0, 0x0, 0x100000000, 0x88081, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x2, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x7, 0x1, @perf_config_ext={0x0, 0x5}, 0x40, 0x6, 0xfbc1, 0x2, 0x9, 0x9, 0x9, 0x0, 0xff00000, 0x0, 0x69}, 0x0, 0xf, r1, 0x3) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:25:40 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:40 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:40 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x80000) 00:25:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:50 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:50 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, 0x0, 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:50 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x100000) 00:25:50 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:50 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(0x0, &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:50 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) pread64(r1, &(0x7f00000001c0)=""/63, 0x3f, 0x3) fsconfig$FSCONFIG_SET_STRING(r1, 0x1, &(0x7f0000000140)='#\x00', &(0x7f0000000180)='\\\x00', 0x0) 00:25:50 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:50 executing program 7: r0 = fork() r1 = fork() kcmp(r0, r1, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r2 = getpid() setpgid(r1, r2) r3 = fork() ptrace(0x4208, r3) r4 = fork() kcmp(r3, r4, 0x2, 0xffffffffffffffff, 0xffffffffffffffff) r5 = getpid() setpgid(r4, r5) clone3(&(0x7f00000003c0)={0x8e8000, &(0x7f0000000200), &(0x7f0000000240), &(0x7f0000000280), {0xa}, &(0x7f00000002c0)=""/38, 0x26, &(0x7f0000000300)=""/127, &(0x7f0000000380)=[r2, r5], 0x2}, 0x58) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f00000000c0)='./file0/file0\x00', &(0x7f0000000080)=""/11) newfstatat(0xffffffffffffff9c, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2000) 00:25:50 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x200000) 00:25:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:50 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', 0x0) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:25:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:50 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:25:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(0x0, &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) 00:25:50 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:50 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x1000000) 00:25:50 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:50 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:25:51 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$bind(&(0x7f0000000140)='./file0\x00', &(0x7f0000000180)='./file0\x00', &(0x7f00000001c0), 0x1000002, 0x0) r1 = openat2(r0, &(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x101000, 0x8a, 0x2}, 0x18) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) syz_mount_image$msdos(&(0x7f0000000280), &(0x7f00000002c0)='./file0\x00', 0x5, 0x9, &(0x7f0000000900)=[{&(0x7f0000000300)="60c001c3d83b421c7f25049e9be1bd3a51c0998ff7ca08f46ac148e06fd464c36bae823746987b887834b732eb0ab184542bedc731f1e9c20ee168ed7ecf5f6da11eb7f7946ba46f2c6f916fa2d4bdf07c9d91e2acfe89f947ac5876ea74662f771bdfa2ac844809c8172754b17e785c4119bbed", 0x74, 0x800}, {&(0x7f0000000380)="c35f13b9cd19acca27c0452fc645af96cd9dc2064768a0d6caae7012067f218c", 0x20, 0x6}, {&(0x7f00000003c0)="2715505aeb22320c73636a9a28eff1ca83f84c26ed2fd6f8c8ea45fa216d753014c0beff758dd066e27b86ef2b4fc3900c52f212f2114d93e0e23c55aa7c790a39dad50d33ac5394742ad480b6425472721fbce09cd787eefc90ee028649b8152dbab808c700f94d65a3ab08bfa1708dd93efbc23d522ec588f225fc2f1db327fc17", 0x82, 0xea8d}, {&(0x7f0000000480)="73da9662d725cdfda56490c12f7058fa3f18b18d3c2a958a40e684554637ce3bba7fb247cf7c404feff3e6c9f3abf6f41d0d59f69cb81b0b82cf695ae66f579761a1b1c6d21620b0c11bb917c5000839a2f27c4515810ccf6a21db6e5c4056ce400999ce", 0x64, 0x7}, {&(0x7f0000000500)="b35b64e5feb11f5f2fe6b1bd5e33ffa5a9c838b461c2ec05f2ac466a5f345afb075997cb24c32c40af94f181a877f71e4910f042d56f6524ae1cd1304d5ae153dad3d769e99b021cd27b99afe80b7b2055db4cc6f896f4c6f1a908780ed8b16aad0f6dd58f", 0x65, 0x2}, {&(0x7f0000000580)="0c194a0f3e80e980590c798e919c758949160892d9f8b0482f4012b55f1dbad003f18073363a3e870611987b3b1515a9c0c60a2293056b02d014154f73d3e8c860ee311efc1661bcae5cd92d1ec589011af896558d69bb988e3d7d58ee8aecfb66548d8ec8862dfcb68dac0524fe9022dd53633f3ebfaadb051998e849425b8e5568f306c4c94a54332769236e2ed88fee3857a0aacdc9e27585389d047291d59a70cbb23a704ce1838f94cc5e", 0xad, 0x6}, {&(0x7f0000000640)="1910f7b0d04065988a3ab60e8186890b7a7fb6d8e4e0b119c22b99b1ef7eae17e1a823aa0fef1c2f4b6e6200f7920a78207795deb0523cd9e781ebabb6682d08e44137e74297181bdb4203f49b41e424ce17aa96c580fad929ef7ae9dce21212fa847b0aedcf3d8e4e509ceb161a7deb0e5fe7dc98f2d11e075130ace2508461557290e803801cd15610224855145a7f4c678621442587886e30b3849fe8dd2daeea19e805677106e7d6ce51011345fbf839717a39ffca5696ea4c2a4d94191580ed835d1969b4a81c0d92b3663379f9f80a680e4ee0b0fbbf6e105933b9f8b435342144944cd9f66099", 0xea, 0x401}, {&(0x7f0000000740)="059cf538806d80b3e0c48d5694a6e56640fe91e98b6917d4eb7b392104d189678e1172f22b6ba15a67d09c40a0d17a88f07bd65df72f4438691b10591c7422fff1ea1888ea51f499415c08f8bdd4855d9490d0b26cc0983f4adeb50dd6d01df698a92f9d0bc822ac6229f53ceb7e65e2ce5af2c0aa6e1a702361d3005b22ebc6517a52f3ebab1f80ea46f86d57bfe6c8d1779b0fa399a10118b85e71", 0x9c, 0x8}, {&(0x7f0000000800)="460d7b5f883120077f088fba3d15519a562adc6addbf9eeaf81cae986b73f57ef503a35d6018680aa61ef4a982a0bb4cb4297351ba4f1bce085050be758a6eb2e5f0be32b6527a71550cfe630c3923642f24cea837704865d8f4cb97f0d0a06d79f7bcea9ade5b662a4b16a27b2b42194d260a597b1935521b1f1bd4e21dcdab960d8afa39b13fde785fc47b646da8aa5a3b6dc730b0cfc4a304691bcfbb17e4facb2607d326a273b004ea3e05747723b68d5de2c933b127bb322d2066e124249d1025a091a90288a026e7c7cec7d90fc828457f312ee9b200b76b343ec7ae0c0c83d508cb60a10febe2034695d64096823f5a0d20787d50", 0xf8, 0x3}], 0x124000, &(0x7f0000000a00)={[{@dots}, {@fat=@nfs}, {@dots}], [{@smackfshat={'smackfshat', 0x3d, '])$-\'\\#+/}-@@\x8c*%{+'}}, {@rootcontext={'rootcontext', 0x3d, 'user_u'}}]}) fcntl$getownex(r1, 0x10, &(0x7f0000000ac0)={0x0, 0x0}) perf_event_open(&(0x7f0000000a40)={0x3, 0x80, 0x81, 0x1, 0x6, 0x4c, 0x0, 0xa4c, 0x308, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0xcdf, 0x0, @perf_config_ext={0x80, 0x6}, 0x40000, 0x8, 0x6, 0x2, 0x80000000, 0x3, 0x1000, 0x0, 0x3ff, 0x0, 0x9}, r2, 0xd, 0xffffffffffffffff, 0x9) 00:26:03 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, 0x0, 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xffffffffffffffff) 00:26:03 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:03 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', 0x0) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:03 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:26:03 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x2000000) 00:26:03 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x7, 0xff, 0x0, 0xfc, 0x0, 0x5, 0x10400, 0x7, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0xe, 0x0, @perf_bp={&(0x7f0000000140), 0x7}, 0x40500, 0x7, 0x2, 0x8, 0x478, 0x401, 0x2, 0x0, 0x2, 0x0, 0x800}, 0xffffffffffffffff, 0x9, 0xffffffffffffffff, 0x9) 00:26:03 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xffffffffffffffff) 00:26:03 executing program 7: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x5, 0x4, 0x0, 0x1, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x40, 0x0, @perf_bp={&(0x7f0000000100)}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0xffffffff, 0x9, 0x0, 0x47ffffff, 0x0, 0x3}, r0, 0xf, r1, 0x8) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) clock_gettime(0x0, &(0x7f0000000140)={0x0, 0x0}) timerfd_settime(r1, 0x0, &(0x7f0000000180)={{r2, r3+10000000}, {0x77359400}}, &(0x7f00000001c0)) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r4 = openat(r1, &(0x7f0000000200)='./file1\x00', 0x10000, 0x100) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r5 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r5, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r5, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x3, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x40000000001f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x6, r5, 0x0) sendmsg$AUDIT_TTY_SET(r5, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(r1, 0xc0189378, &(0x7f00000006c0)={{0x1, 0x1, 0x18, r1, {r1}}, './file0\x00'}) r7 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000740)='cgroup.procs\x00', 0x2, 0x0) io_submit(0x0, 0x4, &(0x7f0000000840)=[&(0x7f00000004c0)={0x0, 0x0, 0x0, 0x1, 0x1, 0xffffffffffffffff, &(0x7f0000000400)="f9abb784a4372164106fb2a3ad2f9b78f10cc9bec711dd2318de3ca61425cfa9b143d242b12746abb26926c3aafa190dfb718a6f112ac888870eb78cf71e95047415d36d0ac4eab8e82151b1f83a45f9e10c2d2258729c27b296c28a423968062013d7593f6b0f18db7fe6c3c40b1a42e57217377fcbf4f5e2be38688b0789dadcbe674d8f9949a3245cd492d8b89f2d1f49bd66c2c6202530d7b4082dcf710a6c869a68425f1a42dad86ef4a8b89f33384e540b02d78d47f87ace0d6971dabf", 0xc0, 0x4, 0x0, 0x3, r1}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000500)="10fed30bb617c1e45fda94053b2b2edd54761f04869c4868dad85bfe5c420c7e8782f0f8927363d02c827339bc3ad3060355dfd53da8f0be7a862cfc653cbd929cab0b08dfc254e1c80bd11b26b3279601538b58296dc7e5c4f45891e45e93c8abd118ad9f714729868266c8c6150eb1bf", 0x71, 0xff, 0x0, 0x6}, &(0x7f0000000700)={0x0, 0x0, 0x0, 0x6, 0xfffc, r5, &(0x7f00000005c0)="7fdb5b318cb0f0b6d70fbf65fb4863290468ea1b3402edd3fb024c073bbe61a08dc1547c1144331b5a50ee4b27ce28ae276935ea5ad025541c9a9f7cca8ffae12991e0b4c4adafb50c38ea20223fd30bd8c40533fb7f56cfa263115314f714ba239077a9ad5ef4fa46f1894348c3427ceeb09dd5cc19e04a8ceabfc02d3fc927a40745aeab050f0aa1347589319cf9ce82aa4f0b8a84883c547f28d9f8111b4bfa0ede07e1f12d74f2e1c114dae1710188b312b6277d5395ab10fe9126956da7007a119aced219d235e909343c3259cdb1bdb0668b63b4228133ff69ba8d", 0xde, 0x9, 0x0, 0x2, r6}, &(0x7f0000000800)={0x0, 0x0, 0x0, 0x6, 0x3, r7, &(0x7f0000000780)="19a4fb56d02fc1ace0aa3b3a393adf956c32e3cb1c1753fe3a3d128529b8376c93bc8a5dbddc49cab2734fb32814fbc076cd411b5fd14e66eefaf390529a9d13a86bfdd74cc593bb7259d195a2ce2d9adb27dead67deb538ddb3c01e68c6b9c39afa962533d2e0434b40b975b5", 0x6d, 0x1, 0x0, 0x0, r4}]) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:26:03 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x3000000) 00:26:03 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:03 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', 0x0) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), 0x0, 0x0, 0x0, 0xffffffffffffffff) 00:26:04 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:26:04 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', 0x0) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:04 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:04 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', 0x0) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:04 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(0xffffffffffffffff, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:14 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x0, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:14 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x4000000) 00:26:14 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', 0x0) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:14 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x10, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:26:14 executing program 7: r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f00000001c0)=""/135, 0x87, 0xfffffffffffffc00) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2000}, 0x0, 0x0, r1, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r2 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x0, 0x8, 0x4, 0x18, 0x0, 0x6, 0x4a204, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0xfffffffffffffffb}, 0x8080, 0x6, 0x101, 0x6, 0x916f, 0x6, 0x6, 0x0, 0x5, 0x0, 0xe67}, r2, 0x9, 0xffffffffffffffff, 0xa) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:26:14 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:14 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(0xffffffffffffffff, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:14 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, 0x0, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x5000000) 00:26:15 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = getpid() r1 = syz_io_uring_complete(0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x7, 0x9, 0x3, 0x7, 0x0, 0x8, 0x400, 0xe, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x80000001, 0x1, @perf_config_ext={0x2, 0x8000}, 0x0, 0x977e, 0xc46, 0x7, 0x1, 0x9, 0x1f, 0x0, 0x1, 0x0, 0x9ec}, r0, 0xc, r1, 0xa) 00:26:15 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(0xffffffffffffffff, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:15 executing program 3: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8400) 00:26:15 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) lseek(r2, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:15 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, 0x0, 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:15 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x6000000) 00:26:15 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(0x0) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:15 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(0x0, 0x0) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:25 executing program 2: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(0x0, 0x0) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:25 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(0x0, 0x0) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:25 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(0x0) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:25 executing program 4: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8300) 00:26:25 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:26:25 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) lseek(r2, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:25 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x7000000) 00:26:25 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = fork() r2 = fork() kcmp(r1, r2, 0x4, 0xffffffffffffffff, 0xffffffffffffffff) r3 = getpid() setpgid(r2, r3) perf_event_open(&(0x7f0000000680)={0x5, 0x80, 0x6, 0x1, 0x1, 0x83, 0x0, 0x3f, 0x90000, 0x2, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x4, 0x4, @perf_config_ext={0x370, 0x1}, 0x2200, 0x401, 0x5, 0x1, 0x6, 0x100, 0x391f, 0x0, 0x5, 0x0, 0x7}, r3, 0xa, r0, 0x3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000140), 0x240900, 0x0) writev(r4, &(0x7f0000000600)=[{&(0x7f0000000180)="07af6ec113f25c6938282b9558a31c5a4f94b8842508f265b94295a30e48ec33e4991359da6f821da9f1e99f7b772b1bbe7fda940c9cbc08498ed56f3c9f3134d175", 0x42}, {&(0x7f0000000200)="1749946c96a64a5afdc52bc8355d5e0ae191f98e441ce9ef8e2dff6bb0e574f2f4423a3125757594acbc7a7e558e654615dad58f87d0d7b8095fc568be03fbd6e651e2a90452af358aae107610e3a6bcb3dbeeb03391ae9255e73653ec20f56425e39838451b74b54e89750dc2dae3139a352310194023fcb2c40c9f80be17451b0ae351c8b6a1ee8422d0812040abb4ab7a47d45ea91a79279813d842e7261057dd13f6", 0xa4}, {&(0x7f00000002c0)="97a77e4d61b823772f97aa8eff740c39ea64129f23bd8fc5", 0x18}, {&(0x7f0000000300)="470660a60e8ba07d48787d02122890f9adcb3a4985ff339e8a55e0d200c8acdbb2ff3cae83c884a6e2aea47efdaa075ed3d1133a42dd65174dc0040f006f370cdd9a1cc8288081f90702cb79bb554874831239f057bc14ae90be94b7423eb29317352bbd4ecdea4b829893b0f55449e09e6f4985ac64ad7b375e46ba939b988e9c565938a9e312bdafc3ecd855e81a6ddf4493e1a5f7f9ae8e35411d9797b2594b23016f22da88207a461905629aa5040261124b6256d16df99341f620b582375352a583059bb249757ed2ed3cf8d28c0c1d203f06b5b98056c2655358770cacdeb41f362abcef72905e7b1433ded67336130975", 0xf4}, {&(0x7f0000000400)="1aa3e079f92872c572ad88750b9fdc45228c04e3afda79888259a8d01ca377b4b08482ec31a51cc8b18a550de8ba45dc6aacf53aa9777410e5c7ed50c0e9774b3edb378fc60653976a128f6ab30b67d0f05ac66331589c3f912e39e42360200fc300", 0x62}, {&(0x7f0000000480)="8cadb1b2adab3dce49fbd86ffd257719dc4b31184c5acacfcc97ba1d2f1cacec8b65d7668a9059e8002490c939b639dac73057a1d82b2bc8754914478e255e4d7c6d32afda75ebde3ba2bc2477c3929f287928abe78f3feb5eb007878b2b2c8ef856dce03528d788e00e134cec4e21a63c359057c7db237c3c0efb77b13381cec3234ab435106fd0749163caf6", 0x8d}, {&(0x7f0000000540)="100b53fa5d1245cdc97fa3", 0xb}, {&(0x7f0000000580)="7e707959c26eac7b2e7d2a67acd82765bb5d0cc2a7e982c7c9980851a151c10cc2fbf4f6836cd3225e720b27998432a4c397e550961086e9fe2762e1deef43efdd61b9ce5223dc8d2a685891f598a0945b06f69dfd256a869ba49e70796f141756290dce9187978fe0f3af009d583c7eba82b61da75e7de7f5c2cd7c99", 0x7d}], 0x8) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:26:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 1) [ 1297.177065] FAULT_INJECTION: forcing a failure. [ 1297.177065] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1297.178153] CPU: 1 UID: 0 PID: 89458 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1297.178169] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1297.178176] Call Trace: [ 1297.178180] [ 1297.178185] dump_stack_lvl+0xfa/0x120 [ 1297.178204] should_fail_ex+0x4d7/0x5e0 [ 1297.178222] strncpy_from_user+0x3b/0x2f0 [ 1297.178242] __do_sys_add_key+0xa8/0x440 [ 1297.178259] ? __pfx___do_sys_add_key+0x10/0x10 [ 1297.178273] ? syscall_trace_enter+0x1cf/0x240 [ 1297.178290] ? lock_release+0xc8/0x290 [ 1297.178312] do_syscall_64+0xbf/0x390 [ 1297.178329] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1297.178342] RIP: 0033:0x7f6645f24b19 [ 1297.178351] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1297.178363] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1297.178374] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1297.178382] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1297.178390] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1297.178397] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1297.178404] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1297.178421] 00:26:25 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 2) 00:26:25 executing program 4: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f0000000000)={0x0, 0x0}, &(0x7f0000000040)=0x5) setuid(r2) ioctl$KIOCSOUND(r0, 0x4b2f, 0x0) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) ioctl$SIOCGSTAMP(r4, 0x8906, &(0x7f0000000080)) ioctl$KDGKBLED(r4, 0x4b64, &(0x7f0000000180)) 00:26:26 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(0x0) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:26 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)=[{&(0x7f0000001400)={0x20, 0x18, 0x1, 0x0, 0x0, "", [@typed={0xa, 0x0, 0x0, 0x0, @str='wla\x021\x00'}, @typed={0x4, 0x1e, 0x0, 0x0, @binary}]}, 0x20}], 0x1}, 0x0) 00:26:26 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 3) 00:26:26 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) newfstatat(0xffffffffffffff9c, &(0x7f0000000300)='./file0\x00', &(0x7f0000000340), 0x6000) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1100) setresuid(0x0, r0, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000180), 0x2000000, &(0x7f00000001c0)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@nodevmap}, {@access_uid={'access', 0x3d, 0xee00}}, {@posixacl}, {@version_9p2000}], [{@smackfsroot={'smackfsroot', 0x3d, '!:\xa6'}}, {@subj_type}, {@fsuuid={'fsuuid', 0x3d, {[0x37, 0x63, 0x39, 0x0, 0x0, 0x38, 0x36, 0x37], 0x2d, [0x38, 0x33, 0x64, 0x36], 0x2d, [0x63, 0x31, 0x34, 0x66], 0x2d, [0x38, 0x62, 0x61, 0x36], 0x2d, [0x32, 0x34, 0x63, 0x3c, 0x37, 0x34, 0x62, 0x6a]}}}, {@fsuuid={'fsuuid', 0x3d, {[0x34, 0x31, 0x32, 0x30, 0x64, 0x36, 0x34, 0x61], 0x2d, [0x38, 0x30, 0x35, 0x34], 0x2d, [0x39, 0x33, 0x30, 0x30], 0x2d, [0x62, 0x31, 0x62, 0x9], 0x2d, [0x30, 0x35, 0x37, 0x64, 0x31, 0x36, 0x31, 0x36]}}}, {@uid_eq={'uid', 0x3d, 0xee01}}, {@euid_eq={'euid', 0x3d, r0}}]}}) 00:26:26 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, 0xffffffffffffffff, 0x0) lseek(r2, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) [ 1297.474564] netlink: 'syz-executor.3': attribute type 30 has an invalid length. 00:26:36 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x8100000) 00:26:36 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(0x0) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:36 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:36 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x5440, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="950671d95eaf99708f02e7d7b787060f0e3fbbf561b2d9c561760c1ccd4e8dc2ae0bcf8b75c0b84b53b4ff2327636e0880b3987e4d2e40699826a8b389b37026d5cef72f158508c04eada286397b983083e2301288cdfa6282475e332bd97fcf0c850a9097639ae5d92a52b0fe2c7686c08d231278", 0x75, 0x5cb}, {&(0x7f0000000240)="28166423f97c865f38a518053ee23e43d6e57fc9f1d7", 0x16, 0xcc}, {&(0x7f0000000280)="08ff476d33401ffb2850712f2650da8eb471fd6d9e6090835d53dad3d4a41c3c3127a6d168cc41cb73136b234bdbfa4a0f9160c8db380f323ffe", 0x3a, 0x7}, {&(0x7f00000002c0)="809d2af87b7aa7231409019171964b0226940f1755fccf4547c7d88989f3464e3d04c1344f3fd88d0911cd07503338fcecc1694922be44834acb50bc0624b637a86ee7cd533c42bfa9b21dc7d4034aff79aa238ac19bf68c283c2e5f8bb8617689e133ec1200ad2b04033b985c1901b24db2a0311cdd2f6505dd2a07e605f49f804c85747ad3494320f011caf5c46c1dc3de5110be035bd62d612ffaae01", 0x9e, 0xea5a}, {&(0x7f0000000380)="f646302046b75847c54dd359d9b0624617e85a9cd68143844a7b2847c1f2984edbaaa73900fd766cdbe97430799ecfba8cd5fda10d916a34c20b8c51965d6afa966393ca2000ad2ef3dc17c25cd53043420f6464c954f90d5fca47fd1c3bd6d1cbd98a99a5db28d9a59c04", 0x6b, 0x2}], 0x100000, &(0x7f0000000480)=ANY=[@ANYBLOB="646f74732c643174732c7379735f696d6d757461626c652c6572726f72733d72656d6f756e742d726f2c6e6f646f74732c646f6e745f686173682c6d61736b3d4d41595f57524954452c6673757569643d62300738333930372d396434612d370533622d353762362d31323900336164642c6d61736b3d4d41595f57524954452c657569643e", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 00:26:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 4) 00:26:36 executing program 4: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000200)={0x0, &(0x7f0000000040)}, 0x10) 00:26:36 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:26:36 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) [ 1307.530079] FAULT_INJECTION: forcing a failure. [ 1307.530079] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 1307.531208] CPU: 1 UID: 0 PID: 90486 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1307.531225] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.531232] Call Trace: [ 1307.531236] [ 1307.531241] dump_stack_lvl+0xfa/0x120 [ 1307.531260] should_fail_ex+0x4d7/0x5e0 [ 1307.531277] _copy_from_user+0x30/0xd0 [ 1307.531292] memdup_user+0x7e/0xe0 [ 1307.531310] strndup_user+0x78/0xe0 [ 1307.531327] __do_sys_add_key+0x130/0x440 [ 1307.531343] ? __pfx___do_sys_add_key+0x10/0x10 [ 1307.531357] ? syscall_trace_enter+0x1cf/0x240 [ 1307.531374] ? lock_release+0xc8/0x290 [ 1307.531396] do_syscall_64+0xbf/0x390 [ 1307.531412] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.531425] RIP: 0033:0x7f6645f24b19 [ 1307.531434] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.531446] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1307.531457] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1307.531465] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.531472] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1307.531480] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.531486] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1307.531507] 00:26:36 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:26:36 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 5) 00:26:36 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) [ 1307.710988] FAULT_INJECTION: forcing a failure. [ 1307.710988] name failslab, interval 1, probability 0, space 0, times 0 [ 1307.712067] CPU: 1 UID: 0 PID: 90641 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1307.712083] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1307.712090] Call Trace: [ 1307.712094] [ 1307.712099] dump_stack_lvl+0xfa/0x120 [ 1307.712118] should_fail_ex+0x4d7/0x5e0 [ 1307.712135] ? prepare_creds+0x2c/0x7e0 [ 1307.712152] should_failslab+0xc2/0x120 [ 1307.712169] kmem_cache_alloc_noprof+0x80/0x690 [ 1307.712188] ? perf_trace_lock_acquire+0xc9/0x700 [ 1307.712210] ? prepare_creds+0x2c/0x7e0 [ 1307.712224] prepare_creds+0x2c/0x7e0 [ 1307.712242] lookup_user_key+0x38b/0x12a0 [ 1307.712263] ? __pfx_lookup_user_key+0x10/0x10 [ 1307.712280] ? __might_fault+0xe0/0x190 [ 1307.712292] ? find_held_lock+0x2b/0x80 [ 1307.712304] ? __might_fault+0x138/0x190 [ 1307.712318] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1307.712338] ? _copy_from_user+0x5b/0xd0 [ 1307.712352] ? memdup_user+0x95/0xe0 [ 1307.712372] __do_sys_add_key+0x1d2/0x440 [ 1307.712386] ? __pfx___do_sys_add_key+0x10/0x10 [ 1307.712400] ? syscall_trace_enter+0x1cf/0x240 [ 1307.712416] ? lock_release+0xc8/0x290 [ 1307.712437] do_syscall_64+0xbf/0x390 [ 1307.712453] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1307.712466] RIP: 0033:0x7f6645f24b19 [ 1307.712475] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1307.712486] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1307.712502] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1307.712510] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1307.712517] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1307.712525] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1307.712531] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1307.712548] 00:26:36 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe6, 0x0, 0x0, 0x0, 0x0, 0x800000000000000, 0x0, 0x1e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}, 0x20c, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0xfffffffffffffffd}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x5, 0x80, 0x0, 0x7f, 0x2, 0x20, 0x0, 0x101, 0x40000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x85, 0x1, @perf_bp={&(0x7f0000000140)}, 0x482, 0x143, 0x0, 0x3, 0x8, 0x10000, 0x0, 0x0, 0xfffffffe, 0x0, 0x1}, 0x0, 0x10, r0, 0x3) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:26:36 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0xa000000) 00:26:36 executing program 4: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x5440, 0x5, &(0x7f0000000400)=[{&(0x7f00000001c0)="950671d95eaf99708f02e7d7b787060f0e3fbbf561b2d9c561760c1ccd4e8dc2ae0bcf8b75c0b84b53b4ff2327636e0880b3987e4d2e40699826a8b389b37026d5cef72f158508c04eada286397b983083e2301288cdfa6282475e332bd97fcf0c850a9097639ae5d92a52b0fe2c7686c08d231278", 0x75, 0x5cb}, {&(0x7f0000000240)="28166423f97c865f38a518053ee23e43d6e57fc9f1d7", 0x16, 0xcc}, {&(0x7f0000000280)="08ff476d33401ffb2850712f2650da8eb471fd6d9e6090835d53dad3d4a41c3c3127a6d168cc41cb73136b234bdbfa4a0f9160c8db380f323ffe", 0x3a, 0x7}, {&(0x7f00000002c0)="809d2af87b7aa7231409019171964b0226940f1755fccf4547c7d88989f3464e3d04c1344f3fd88d0911cd07503338fcecc1694922be44834acb50bc0624b637a86ee7cd533c42bfa9b21dc7d4034aff79aa238ac19bf68c283c2e5f8bb8617689e133ec1200ad2b04033b985c1901b24db2a0311cdd2f6505dd2a07e605f49f804c85747ad3494320f011caf5c46c1dc3de5110be035bd62d612ffaae01", 0x9e, 0xea5a}, {&(0x7f0000000380)="f646302046b75847c54dd359d9b0624617e85a9cd68143844a7b2847c1f2984edbaaa73900fd766cdbe97430799ecfba8cd5fda10d916a34c20b8c51965d6afa966393ca2000ad2ef3dc17c25cd53043420f6464c954f90d5fca47fd1c3bd6d1cbd98a99a5db28d9a59c04", 0x6b, 0x2}], 0x100000, &(0x7f0000000480)=ANY=[@ANYBLOB="646f74732c643174732c7379735f696d6d757461626c652c6572726f72733d72656d6f756e742d726f2c6e6f646f74732c646f6e745f686173682c6d61736b3d4d41595f57524954452c6673757569643d62300738333930372d396434612d370533622d353762362d31323900336164642c6d61736b3d4d41595f57524954452c657569643e", @ANYRESDEC=0xee01, @ANYBLOB=',\x00']) 00:26:36 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:48 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:48 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:26:48 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x7, 0x36, 0x1f, 0x1, 0x0, 0x6, 0x40008, 0x6, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x40, 0x4, @perf_config_ext={0x8eef, 0xffffffffffffff00}, 0x2802, 0x11a5, 0x401, 0x4, 0xfffffffffffffeff, 0xfffffbff, 0x7f, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xc, 0xffffffffffffffff, 0x1) 00:26:48 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x10000000) 00:26:48 executing program 3: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:48 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0x0, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:26:48 executing program 4: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 6) 00:26:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 7) 00:26:59 executing program 3: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:59 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:59 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:59 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_elf64(r0, &(0x7f0000000140)=ANY=[@ANYBLOB="7f454c46017f400603000000000000000200030000000100a3020000000000004000000000000000c90300000000000004000000060038000100000080008a6c51e5746408000000ff07000000000000090000000000000004000000000000000200000000000000500c000000000000ffff000000000000060000000300000001800000000000000600000000000000080000000000000001000000000000000900000000000000080000000800000092c0cb9b54bd4e65442484f51767f229f0ad7b20b04f7014ab2e61c933fa18e52966e859a8581e660e88a69343d496d2514b603d40baded99aadfe868924efbef9c0aba035892f5e2d6f0b8dc1a05b84921b36a10017446a472abcace011ffdae0ec0423687a383951e4d36326834d2433efe8e7540bd80f3f37bfda824185ec709f886f8bc429eaf80e28be75fdb2adf1f2bb328a4c2f32f81ab790f15e090351cc3de6d8a48d2b23ea40fa9ac7a513fd0b6cd5ab99b429bc22ce661614ac901f5f1b3382c086095a6bda88edefe475fe1ac1d8615797648a3f9dcd716b49f2ba9c32f846d3a894559b253d66000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000001748ad042148923900"/910], 0x39d) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000500)=0x2) r1 = socket$inet_tcp(0x2, 0x1, 0x0) close_range(r1, r0, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:26:59 executing program 4: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:59 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0x0, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:26:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x3f000000) [ 1330.415274] FAULT_INJECTION: forcing a failure. [ 1330.415274] name failslab, interval 1, probability 0, space 0, times 0 [ 1330.416797] CPU: 0 UID: 0 PID: 91959 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1330.416823] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1330.416834] Call Trace: [ 1330.416840] [ 1330.416847] dump_stack_lvl+0xfa/0x120 [ 1330.416874] should_fail_ex+0x4d7/0x5e0 [ 1330.416900] should_failslab+0xc2/0x120 [ 1330.416925] __kmalloc_noprof+0xcd/0x680 [ 1330.416954] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 1330.416977] ? security_prepare_creds+0x101/0x160 [ 1330.417009] security_prepare_creds+0x101/0x160 [ 1330.417038] prepare_creds+0x579/0x7e0 [ 1330.417069] lookup_user_key+0x38b/0x12a0 [ 1330.417103] ? __pfx_lookup_user_key+0x10/0x10 [ 1330.417129] ? __might_fault+0xe0/0x190 [ 1330.417149] ? find_held_lock+0x2b/0x80 [ 1330.417170] ? __might_fault+0x138/0x190 [ 1330.417193] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1330.417226] ? _copy_from_user+0x5b/0xd0 [ 1330.417250] ? memdup_user+0x95/0xe0 [ 1330.417281] __do_sys_add_key+0x1d2/0x440 [ 1330.417304] ? __pfx___do_sys_add_key+0x10/0x10 [ 1330.417327] ? syscall_trace_enter+0x1cf/0x240 [ 1330.417353] ? lock_release+0xc8/0x290 [ 1330.417387] do_syscall_64+0xbf/0x390 [ 1330.417413] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1330.417433] RIP: 0033:0x7f6645f24b19 [ 1330.417447] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1330.417465] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1330.417484] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1330.417504] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1330.417515] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1330.417527] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1330.417543] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1330.417572] 00:26:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 8) 00:26:59 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:59 executing program 3: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) 00:26:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x40000000) 00:26:59 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) sendmsg$AUDIT_TTY_SET(r1, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) inotify_add_watch(r1, &(0x7f0000000140)='./file0\x00', 0x80000000) 00:26:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 9) 00:26:59 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0x0, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r5 = fork() setpgid(r5, r4) 00:26:59 executing program 4: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r2 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r2, 0x0) lseek(0xffffffffffffffff, 0xd20e, 0x0) r3 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') r4 = fork() setpgid(r4, r3) [ 1330.929186] FAULT_INJECTION: forcing a failure. [ 1330.929186] name failslab, interval 1, probability 0, space 0, times 0 [ 1330.931062] CPU: 1 UID: 0 PID: 92868 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1330.931091] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1330.931104] Call Trace: [ 1330.931111] [ 1330.931119] dump_stack_lvl+0xfa/0x120 [ 1330.931149] should_fail_ex+0x4d7/0x5e0 [ 1330.931177] ? key_alloc+0x3e1/0x1280 [ 1330.931196] should_failslab+0xc2/0x120 [ 1330.931224] kmem_cache_alloc_noprof+0x80/0x690 [ 1330.931268] ? key_alloc+0x3e1/0x1280 [ 1330.931285] key_alloc+0x3e1/0x1280 [ 1330.931317] ? __pfx_key_alloc+0x10/0x10 [ 1330.931339] ? security_prepare_creds+0x101/0x160 [ 1330.931376] keyring_alloc+0x46/0xc0 [ 1330.931403] lookup_user_key+0xbec/0x12a0 [ 1330.931454] ? __pfx_lookup_user_key+0x10/0x10 [ 1330.931485] ? __might_fault+0xe0/0x190 [ 1330.931513] ? find_held_lock+0x2b/0x80 [ 1330.931537] ? __might_fault+0x138/0x190 [ 1330.931562] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1330.931599] ? _copy_from_user+0x5b/0xd0 [ 1330.931625] ? memdup_user+0x95/0xe0 [ 1330.931659] __do_sys_add_key+0x1d2/0x440 [ 1330.931686] ? __pfx___do_sys_add_key+0x10/0x10 [ 1330.931712] ? syscall_trace_enter+0x1cf/0x240 [ 1330.931740] ? lock_release+0xc8/0x290 [ 1330.931778] do_syscall_64+0xbf/0x390 [ 1330.931806] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1330.931828] RIP: 0033:0x7f6645f24b19 [ 1330.931845] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1330.931865] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1330.931886] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1330.931901] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1330.931914] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1330.931927] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 1330.931940] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1330.931974] 00:26:59 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:26:59 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:59 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:26:59 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x81000000) 00:26:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 10) 00:26:59 executing program 7: sendmsg$TIPC_CMD_SHOW_PORTS(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x4}, 0xc, &(0x7f00000001c0)={&(0x7f0000000180)={0x1c, 0x0, 0x200, 0x70bd28, 0x25dfdbfd, {}, ["", "", ""]}, 0x1c}, 0x1, 0x0, 0x0, 0x15}, 0x4010) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f0000000140)=""/34) 00:27:08 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:27:08 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:08 executing program 4: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640), 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r2}}, {@permit_directio}]}}) r3 = fork() r4 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r5 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r5, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r4}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r6 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r3, 0x0, 0xffffffffffffffff, 0x0) dup(r6) 00:27:08 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000640)=0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) perf_event_open(&(0x7f00000005c0)={0x4, 0x80, 0x3, 0xeb, 0xe1, 0xb0, 0x0, 0x0, 0xc4800, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x2, @perf_config_ext={0x8, 0x9}, 0x10000, 0x0, 0x1000, 0x1, 0x707, 0x4e, 0xb2, 0x0, 0x81, 0x0, 0x9000000000}, r0, 0xc, r2, 0x8) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) syz_mount_image$nfs4(&(0x7f0000000440), &(0x7f0000000480)='./file0\x00', 0x2, 0x2, &(0x7f0000000540)=[{&(0x7f00000004c0)="de7cf4f20e216e9e5ecbf86b563b2ece419b682a292d5b", 0x17, 0x14b}, {&(0x7f0000000500)="77cf5d57e156d959", 0x8, 0x53395b4c}], 0x3020010, &(0x7f0000000580)={[{'&!'}, {'.-!},'}, {'-'}, {'*]}'}], [{@pcr={'pcr', 0x3d, 0xa}}, {@fsname={'fsname', 0x3d, '&'}}]}) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f0000000280)=[{&(0x7f00000001c0)=""/177, 0xb1}], 0x1, &(0x7f00000002c0)=[@cred={{0x1c}}, @rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}], 0x108}, 0x100) 00:27:08 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x82000000) 00:27:09 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, 0x0) r5 = fork() setpgid(r5, r4) 00:27:08 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:08 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 11) [ 1340.349238] FAULT_INJECTION: forcing a failure. [ 1340.349238] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.351107] CPU: 1 UID: 0 PID: 93724 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1340.351139] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1340.351152] Call Trace: [ 1340.351159] [ 1340.351168] dump_stack_lvl+0xfa/0x120 [ 1340.351199] should_fail_ex+0x4d7/0x5e0 [ 1340.351231] should_failslab+0xc2/0x120 [ 1340.351261] __kmalloc_node_track_caller_noprof+0xc6/0x690 [ 1340.351288] ? trace_kmem_cache_alloc+0x1f/0xb0 [ 1340.351316] ? kmem_cache_alloc_noprof+0x270/0x690 [ 1340.351349] ? key_alloc+0x43f/0x1280 [ 1340.351377] kmemdup_noprof+0x2b/0x60 [ 1340.351409] key_alloc+0x43f/0x1280 [ 1340.351444] ? __pfx_key_alloc+0x10/0x10 [ 1340.351466] ? security_prepare_creds+0x101/0x160 [ 1340.351513] keyring_alloc+0x46/0xc0 [ 1340.351554] lookup_user_key+0xbec/0x12a0 [ 1340.351597] ? __pfx_lookup_user_key+0x10/0x10 [ 1340.351630] ? __might_fault+0xe0/0x190 [ 1340.351654] ? find_held_lock+0x2b/0x80 [ 1340.351679] ? __might_fault+0x138/0x190 [ 1340.351706] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1340.351747] ? _copy_from_user+0x5b/0xd0 [ 1340.351775] ? memdup_user+0x95/0xe0 [ 1340.351810] __do_sys_add_key+0x1d2/0x440 [ 1340.351839] ? __pfx___do_sys_add_key+0x10/0x10 [ 1340.351867] ? syscall_trace_enter+0x1cf/0x240 [ 1340.351898] ? lock_release+0xc8/0x290 [ 1340.351939] do_syscall_64+0xbf/0x390 [ 1340.351969] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1340.351993] RIP: 0033:0x7f6645f24b19 [ 1340.352011] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1340.352032] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1340.352056] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1340.352071] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1340.352085] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1340.352100] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1340.352113] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1340.352147] 00:27:09 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x83000000) 00:27:09 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:09 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 12) 00:27:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 13) 00:27:09 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = openat$pidfd(0xffffffffffffff9c, &(0x7f00000036c0), 0x80, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000003700)={{0x1, 0x1, 0x18, r0, {0xfff}}, './file0\x00'}) getgroups(0x4, &(0x7f0000004000)=[0xffffffffffffffff, 0xffffffffffffffff, 0xee00, 0xee00]) syz_mount_image$tmpfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x7, 0x7, &(0x7f0000003500)=[{&(0x7f00000001c0)="78372598b48e3bd73ab519eeb1b009c562ce281fa9b2a3b94bd9f5a2f30bb3b94d84a6942f15e0805efab68dcab8af6a7dab33fcc84d0042162f886d3de186c78a50666c4bc15570d61df2e4fc3bdb963dc2b01a789b9a2754f434a3d97f0418019d65c7b8d6b5b26405a9cfa0e2565c80f84b8393cf56634d2c2d8c5a4c6c485c5f76618dd5c2623ea05e1867085ac8c0610ab6b960371a116e19114820022da3a025fcdc00cba68bf0e41c49eddbc0c23e26731c2c0c1f3473f98a7c2f04d91af0f8ad760f081a35a90af9c745c40a981947474081d2e0dddeea6ac80b8d48bb1979b34d7d07a35107763ee0dcfe17f725d4d35aa1ad0ccaeb925cade4af413119b2592c1b5cedc24fe160547b6c851132ad1b9cf61e9968f639540bf4c2d50ec3ee7909951bbcf7c6fe6c8d508300a85ea8fe3d1a65e52cded4f501f964b460a10d00b31f5c91bb9f19efb8d4c268dce021fca5c84efade0ab211fc33f7440215d9cae60bc6c48879dbe5e8c0859bcd1f4facea8dc404c0323457afdfde018c63119b5a94b7305839331edb5b6ab99a035641bd509bc6a03ca17209095ac324ca845200eec7bb3e7a6cc6c2476bf06267605fe1b5316d9ae266ba7ab04e36de08416fc66762b21c71acf78884056cb053a5d2471e4b7ae2a108de5b87933dc6aceaeedb512a23e39c84e3b45781f5fbbfed314249db245b296afaa6cc37df0306166d56e53b7ce21e452b10720b24c23a6a57b232c4911e517034c13ff373ecf40905df95cab245d8ea83449b792784aced92437744e06707be8dee8d48fd2812ec36706b563f46966b76c0ec84a2ca1f906a914770037b67edf08228cb3aa00279d58ae19f89b0f7f963c105f95a122b35837d8ac4129d7e1ccff09b7ad21f73b47ec1cb0e22fe77c0ff105e495cadc05fd9e85ad6cd5fe0a771006122f40a016fa20312c072e493209eade49f9886d4e4fdee9b161caf721d4546c75f6c8ec72e18369667967344b2079cd10dcf2f2a8bd43f1ccbb0de49fd0644f4cd61cb27b433a70a808a1a41b96fe6b54f539ed163a34e126b3b92fcadcd04b684259521bbca320eef66144045b3e8828dfa1d29793399630470f0dca9c25b154c2515bbe7e166ba4cf93a284b377a864a8b8c343b4a86b175a7902f43b38ed1e43540fd5f3a104a1a96e8de469e69eca43f22fce546d81d78212bd8f2195b702db6bb7c79bd86ed3433535dc7426befaddd6d4d1d15cba97a087fe94c055884db071e00a43e189846bcd89beba920739c2331c872f19926b03a00d36cc1f97513a9febbc113f945ec926d78d06045c3c9ffd52bfd156a510c9f7d97a41dd1a528a2ae5f9fcb08b55f9f958b570605cb622c8cdd7419a6fa9b28c8a79b61e67bd2993240c5e569f64c23e91268d961afad67642269718443d021c6bcb3c3794179741e2323639216cdaab6fec26f146fa6e78cf5809c7f637b89497bfac06336b86b035f99409afc1520e19cd331476081fc78bb8d2fffb2352e9a4307a6bf0ec311387722179bb1d558441513f70a10c7dff42d2fa283eb6f76bf52d8ed6ba1cba745396a3c2c149a5a407004038b6694f0f025d32bef4a7e5285c39289825e629ad17752fcab965bc0e0696d90a0d2ab5fb30b93e8b55c79aec39629da366870c4351dfee25df066f6d16b4a2dad7e17ddc98f26525b6a4867f95a68528810fd6a014f0088f60adbbc9776fb6622cbff3bcde3e21c56cdc7fc1db15a47a1809e81a0405c35e4b41d9a9f88a7acc030d8805a921aad403fc3ac049083693a84a4b768d4c46c8444b6b4b4e75a60a718d9ff49022012fea8327d1cd443083674dc34aebb0eb733e7f9eecdfb8397917105e7958e33d85c66acf46adea3182514c14d242dee35397f3c4f6f54b2ed5c0e6262e29b1a712a07ed6755f1e218ad8f355c00aff861b0735284b60505c06ff89ce9d1bf6c049f30848a36e9326018d78caaacd8063ae63b44b97bd0fb0d0fcceaefce0dc1d9ae213eecf0231cfc628407eb5d1346a433d0f2618c0a3492c6dba793c11b64d700d61291cfc484a59ddb34d259424cac3f8f9d9bc5c09dd44135ee6ab71f65cc3171125aa6e37c53eafed21e3b7222fbb59c899f97095b7abb3da3d0491232f65c94ef1e6d0c4aa021d4dad73b1ba613f22dd23025d4f0c92c04847ae266ea2ebe90e4334b59042c06d0bb875fe8cd29c75e47c80974da49d498a1681223d4b4b1ce10c296695d6a12640b38285a749ccea9899607d2b704c7d37c266f8d9f72790aa1030c23172b2fd683808606ffac87f7b1a3651760f7875476c152814b77c42cfd9cffb0c569f728649f486aff0601b55165260a1a79c09ad405653a0705ed1b6adefc8277ba1bd3de2266f0255d8a837a8201031a270c2a64fb198cb5ca8fa247b2b364f8a0349183edcc2c5790eb9a305202d4c7100c32cc25f82d6e3cf6bee2225f57491f33a4cfbfe20a1c10628d31f3c314741c26965e8529cf5bd8582e4a4d35c0e391e22b01d8ed48f58fe7c38bc08ab739f81e39b1a366616e017d3b95cb8b8e2778da296e85c9e3efe138994d7baa46bf27f7060b896b410523f78e5a657a63bc7bc9731a41a96f58b969cf68af4b3e161d9bebe465ca4208b5dc92568d278a3bf2896b8ae5fb34fa23b72fbe56ea6783bf4408d5cc83a718fe55ba75ce77a920976b6489257c60387e5fbe1bcb98834757dafc10f92e7c435c6daea9bb44ca233f8e82e7f932546f41852a6bda33af70d3c97d36c0be80614f6477ebcf74e31bc8b6418665aa11ed653de226fdb8b9256799d17b55ad3831f6c16f24673c3434dfe898dc78fefe6855783a775ef35a6459ec1d939dcda3e4ca31a1792116e010d7a12d82bb986f738fa94b8fd7586a53aa6d8abfc3f35220f565fa545a850f5dd6d3530b0be6b30eae901bd75a8c286269aec89426a52faf20524bf3f45e269aaa25ca2447fb8d3cbac0802ef26fd5de77b86c436454db66b54e59edd6bb95df37f175c220817055fae2aec37b62185467f70de66d4be562b8b49b630aafef948a90ff9034b551d0df5c9c827e4351f3f52f0dcd9c485115ea4d6f80b135f5ee5abce5353854a3181106f644b08dfcceea130aa85787d1c6e94b272e78fd4adb9fa94cfebcc6bd2de947161b50e7d5dba31d2c02d8e6f689b2923b7e26ae7d231c90fd71c3c0ad3f32ab12d54b7256aef479bd9d41b206045670e31974e06a15802dca40f98ef2006e4dab247a2531071c0106289b474e3a0331f0fd433b500b883bf0788bef4ae30b8f964c562f4c206908a079043955ef056c733e36b2d648950d7d887730c13f12ae843eb708d243c04084504d17576695e80bcd64b25267c1a2ba4530ad4a6b4d78d91a788df48dfd70a3182982ef71d336777a4e0989902e916593af513ac69b5102160d516f178c909c89fb76ba75c76eb602fce2ffcdbd684a4f770ca10a7fbab51fccf04b138946a04bff7a5c58f5a45c846c3bc9ee58569ef0a48b81f57e190a7d18df810a1fa87f188163dfbb82a3bce492fa076c4708a7517f391f75e870ad0616aaf6d5fd19a0f79f3f030aace055ce191595963d7761b6d09522478a81dcbd4c23513edefd638afe7af04165e6387b985e41fabe5d876bd3ad34b477e558eeb5fd61b8a459b74526c42041a57bb4fe888b632c0801e5187703a2aa683fe4d13191162f34b3a01b551a148b71b428a5559818a9e4edc33fe8bd8be60fe078e226ce06fcd44c617d3983cd3fd147cd349f87ebcb61517cafffdc909d02ef0dd206776cf23ef6268c38de005b18e745f67433ec193d56b4e38589b37435489ca871d2c076852aabafa352725658d8a88cda61cf8304fe09c1cc70d0573ba367d7e7848f30e5663c0b3c89ee39a9197c152d08730b9a1f38b4cdd233be181f263b27e4eefc9c54d54399d04e0ac258f15f3c0b985191e34ed84b43581510a325065c15e480a94820b93ea25c0b93b2af54bb97fef1e82bfc1f51bca7d9897b0289626e3ae417ea606052ca37e746b3647f9d33207d48a2ca7a05d30452edb7500071df3a58a6c69f27cb7d08f91b4b5959b29ca6965dfef49aa9481b83d91dd8a2cb86a034aaeb165f8637f78f1800ddbc1e76da8f38c4c4ed6d8366d8cf68942463eba754d401ca80e854cc950a752d4384ddc00200bc7e9dbcf91e130a9d25fcfe4777ac5ac1a602fbdcef485d4116005bc3398219406fdc5ceebec0cf32f2201acfefcdf4a8173244bbe1a48eb21db6e17014bdc24bf9ec5c77508a8bac3089669c1f009c36a8332b8847fb2dce21231d27b1ab65e6a34c4f3adbcdc47877bd4f871e2197322f4d52a89b4db96d28914125043dd64738c444bf97da259d2fc8343ca11e9967447d8230782a7d4560948469da81ecbf3bdf99723f2057f3ba7a2993091e96e8996aba09deb13343866915077677cf077d6fbdedc5927af809a67c03da8594c089f314998a806a129871010c815e923256ea0cbbeb6f7470ee93b97f2e7ee8ef0aeab28dc50b5383671dafc718b056b91a41838bff35d5ee465fd59a0df4b6a1d7d4b7d18590c732437a9517f05c9a1e008fc086c3ff28d5243ccf62c00dce7bbda85f292d90089c6791a8059b511e7057170fd459e3939b84242e4d6353b4e8d732cb5dd36871d1a2a5bd52b65c56501a2dbddefd7d43c97792f5de9d37d61095479fc29134a56c04521f1e0b2320a0f4fbbd2300d7f121440f15d156e9a31353744d33f941f4a1b25dd0a8483c3ed21c1250b6ef9049a3818779736676d6c202d5b0e87c02784952f686c1e59a02e5c1e5ae121eee545849e27ffa871fbfefc0bb1119f95844294dc43e7bf4c3b090dfdbb0bc7313fb6c9cfbdf3bf09948f292a9b443a23222d9ef8bc7dafd7721b36a0fbeb6e0b3c3a383d8fde91fbe76f5e0e5bf8c841a802f47f9fc7b316af3aa3b811dd3555faea0d50e01354c9b47b17d86c6b815dbff069143b3a9f1f8d292692a2cc602fdf89dc0cb7d50596f53e9f1406bdb6a6359c1df0901ee4f63103386942cea70dd0697cea1ec34ff111dfc53150aac275abf5acad3562e60b77745edf2365e836067988d1e220fecffcb37d338b79fc78f8a0fd726802a8f18359dffb0eb9dbd84ed242b19f9f0a8e472e705479a97b21c5f6ac69faf2b1fcc5d790f520f8bb6407bf007a27ea5e37ccd3132148e4a5fd85b7dea8a0783375e67f7b3057aa9f41ef574f28101df9a8e2bf40e620b28e6f0595b012165babddd5884d22c1bf463fa25dc53191fd0f89360ba1e24189c6713f64a0d99df7361eec6f3649dd3841efe138ad6c4fcd600c62a7d9e501ba753bf714711d71a8393decd9d9c8942b2288a4cee9a4bc2e128dae8dc7d1bb8f2d2558060bb70929500b0286e2b75cb6b113f52a021b4a30ee30504e8083e66b17a3810491263b8dd90992f1e8b139ccdab4f30e3969936163c2e3335ee4c1b63ee8bfcce293524bd600a6f234fe20d11835b2a0f330674e37e43000ccfca0dbe062e5590c9e86bb04dff358d15c3259715f6e6d7fdbb7d4d62f5dcf3c1af15a0c05cad7f4226c189c8031dc12df0378f2151f9a08cff5c5d6dda71bb6c013873eae8c0a8d1c32a4a1bd86047075e18fbb83093dae37a94cc3193a05a59831597f6dc4478d3dada046bfb78219fcc36378bbc6c3f2c8d93679321de87ae76b7cddc6328604e1440f199b15609584e0d8ebb4e2c0e42f1130b1cdcd1604650cde4e44a643b7a6125c059498e52ec3cd1", 0x1000, 0x7}, {&(0x7f00000011c0)="5ab25377a50953ea015085916f9a991d2fd579d6b0406a2511bb1129d8e55714980478d84baca452ccb2a8ab56c2274943270f0ec19c601b131d60e729bd9aa6857e2cb4f36164babe7774dd1c091835f4c3468e7787a1fbb57e9c0cc62331b51d6bc16bfb89a21f6f4cf2d550b1aa53eade04da3bc9e5f70d980127f43a9e6436ad88943bf0f9e590ff1eab60d1c70c29eb75a277716b589ff5f8d80debc2cbb3d32f8ec0668ea1f6cb18189b597992a6b3988e0db0ad69", 0xb8, 0x100}, {&(0x7f0000001280)="bd81382dab352e16960fe73956ca3310cac5fa18918d291fabecd2d81ae250f4da80c4a6656c6376f47e15aa2d2fa7acd0e97460a48c624531df0927b85599311e54b904ac7705d839ac9ce0079e182bbba11a6a0aa7276f204f981b455e96f4309ba3534e9085cd647b8270eabc72972ce34675e736e704f43df499f00dea", 0x7f, 0xbede}, {&(0x7f0000001300)="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", 0x1000, 0x926}, {&(0x7f0000002300)="1ddbcc5837abfb9e1cc596d3e820eeeaa3e66f666e99a9b81a15f31c59eac58e7f783d03914b16276ac58a164fa78149619c965078ed83e04d1da31bc4bde9dbda81620e4618b7fdb7480060729340f908fad92903173a4356f4facef97efeeb869052031089682b54e68943a73cf2ab9d513471e973819f687714003843a438ccad733eb2509a93239279ebdc9305e3ddea9efc6213e27b95eb0212e0e6451556abfc401504430e8e1bbd5dc96dbde1190dfbe18835023685c2444309754cad2f1d904175b527f5ae4f83d848256239c2e0891aeabd23688859b53b77d06625625068b39ffcad4db79cbe1e8ba75d7364c95bb8055f5c2918", 0xf9, 0x2}, {&(0x7f0000002400)="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", 0x1000, 0x4}, {&(0x7f0000003400)="be3d3641cea26e78fe3d80f60096841870d4fa9b4088074899b1ba66d6959c8b302e36d8a69e3061bd159b87ef34982bc6e1ca55d6074177bd013b78b885714c4f283526f782a7e676a67320d6597a39202c6fb4fa061216bde0de0d4cd5dc5dcb8a8385db8931f12f88cd3625ef0c97de032ef51ffacf46017655865c57412024095a952dd82f1eba8599e8fecaa212c74c2c4405f13ba0d2eb3d079d526e69a72012d8ebed4e31ea33b596dc9e21c92744e259c9bee8d2a666183825a7a8c15e08e3f01ad30b05c21544166d1cf10e6abe38620a3d1bbb6b53ce8f04434e28d7b058080259", 0xe6, 0x2}], 0x30, &(0x7f0000004040)={[{@huge_within_size}, {@huge_never}, {@mode={'mode', 0x3d, 0x1f}}, {@huge_advise}, {@huge_within_size}, {@gid={'gid', 0x3d, r1}}, {@huge_never}, {@huge_advise}], [{@obj_user={'obj_user', 0x3d, '@-\x8c.\\\\]*'}}, {@permit_directio}, {@subj_user={'subj_user', 0x3d, '+\'{\x84,,)^:(f'}}]}) r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r3, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r3, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r2, 0x8, r3, 0x4) lstat(&(0x7f0000003d80)='./file0\x00', &(0x7f0000003dc0)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$vfat(&(0x7f0000003740), &(0x7f0000003780)='./file0\x00', 0x2, 0x8, &(0x7f0000003cc0)=[{&(0x7f00000037c0)="2dbf01d1cbf758b618655db6579af21c5a55552719c01d115ff1db22cb5df2e26ff09f133128dbed7f1ad7d91d6286cf0ea6e7434c355e5d4e0af52c5351911de77e582433f06f250c86c167796bcf87540ca252887ea4614f82215635134dce762c70ec106c", 0x66, 0x3}, {&(0x7f0000003840)="6de6aa0b8830e8e857bf106214e1b2d896729cb40613e9810d5e1ff8c6c329f20ea7861a95004ea7bfbf15744b8c2f980b718c949953c28ed1b84567faabdf2c7edfed21ff99f903e0fd5ee98d17db8ac62dd0886a9ec75809511e9eb8695d6ee05bcb4d7ce0bac26946dca28ab936fe92bc4063b0ea760033784fafe98a9b983c24aa3ddee22009f9609c8ba1", 0x8d}, {&(0x7f0000003900)="89799ce18cc55fb2ba11dce029f29b18f9cfcc482657f34dc5afde6ea43b7d55710bcaa23906df404cf23e0214bb4e6bd417bdefbce73db04b9dbfcc52096818b046fffc4209af8f4949461a88718f1f81681ea8e6bef20bf31dfa3faa1b477f6d696b16ee107835d9d7589f703d", 0x6e, 0x77}, {&(0x7f0000003980)="f9ef8830d52fde399e0322c41f76489570678d35bd2744e76ce9cef356501252049535751443279a19fda8b2f37b2a3e6e", 0x31, 0xf82d685}, {&(0x7f00000039c0)="f1895f1f0f4afa5fa3714a442e1ba6386437965b61c3185bcea32cd435bf84745ec0a00d4911ac3c9c1182e6d7ab957f59a753732950e123bd0df45e562a1731c34a6aec211bbc6a0fcfb4f0c6695732adead138203b85e3e10c4d44aa9a1b19e7ae7490aaee6d8405f91fd8f86c287620fd18c4cc2b98e9d24bcf787ef19373781c46d2907069", 0x87, 0x4}, {&(0x7f0000003a80)="ce157ee4f1c623e06e69841a99f06cec92c6cf24f8f9737532830bc2ef9f4f20533315009cd65868a9749431c7769cd594822b3300706910fba3b69153ac5ccf03096d91b9124bd0c8a6935cfeeddf86466ef97ed397a06593e0864e442c65c40e02e4c5761ed9c6fcafe1e3ca7ca6bc4f303098dc7ac18f333c4a350ea4324e864af3b66ab6bce39188cd891b56cc5e048f902347f86f4375f0f1413fe1da48a80682bce098d30d3b9f4b44979d7bd8fa3d3f19bcc8bfb67f792f2f9a89f8aaeda6027b90d2e7cdfae8e8efbcd5ef5f635a12aa49bac6381710aa0edcd5af4961742339cc1349", 0xe7, 0x7ff}, {&(0x7f0000003b80)="27ebe066d9ba4f8661967b8e8b3228686894a6f06bf5bb1b0b018bf75cc606b107d70fdf807d679c154ba3a328077ae58873539584aab3855212acfe5e07981eec9b5a6df4e99b07461819d0af1de8a79f37bc311340bc5b4efeb872e0bf81738cf2c555ce695de89095f89cc5179d258542b1022d63e0e9acae69f8de64adcee2b6e9a2b88112f6c03b59fd2a4aea1027651f4110125399e8d2ad87a13d940a943b1685e764a5451467b7acc3b959ef222305d9b9b760fc7832183628abcaa93cff57940fe42d09834fe273deb19b248beeb86a572ba5c6", 0xd8, 0x4}, {&(0x7f0000003c80)="3331df2f629b9f1ce12d9e593333ebf19697c791a806ab7ddf93e5b3d7e2129534bebf", 0x23, 0x6}], 0x24410, &(0x7f0000003e40)={[{@utf8}, {@shortname_lower}, {@utf8no}, {@utf8no}, {@shortname_mixed}, {@uni_xlateno}, {@iocharset={'iocharset', 0x3d, 'cp437'}}, {@fat=@uid={'uid', 0x3d, r4}}, {@shortname_winnt}], [{@permit_directio}, {@dont_hash}, {@pcr={'pcr', 0x3d, 0x3b}}, {@smackfsfloor={'smackfsfloor', 0x3d, '$'}}, {@appraise_type}, {@fsname={'fsname', 0x3d, '*$&'}}, {@context={'context', 0x3d, 'staff_u'}}, {@fsname={'fsname', 0x3d, 'tmpfs\x00'}}]}) setxattr$trusted_overlay_redirect(&(0x7f0000003f40)='./file0\x00', &(0x7f0000003f80), &(0x7f0000003fc0)='./file0\x00', 0x8, 0x1) sendmsg$AUDIT_TTY_SET(r3, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) inotify_add_watch(r3, &(0x7f0000003680)='./file0\x00', 0x200) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:27:09 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, 0x0) r5 = fork() setpgid(r5, r4) [ 1340.787077] FAULT_INJECTION: forcing a failure. [ 1340.787077] name failslab, interval 1, probability 0, space 0, times 0 [ 1340.788900] CPU: 1 UID: 0 PID: 94495 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1340.788943] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1340.788961] Call Trace: [ 1340.788971] [ 1340.788984] dump_stack_lvl+0xfa/0x120 [ 1340.789022] should_fail_ex+0x4d7/0x5e0 [ 1340.789054] should_failslab+0xc2/0x120 [ 1340.789084] __kmalloc_noprof+0xcd/0x680 [ 1340.789115] ? key_set_index_key+0x329/0x570 [ 1340.789143] ? security_key_alloc+0x158/0x1d0 [ 1340.789167] ? lockdep_init_map_type+0x4b/0x240 [ 1340.789205] security_key_alloc+0x158/0x1d0 [ 1340.789233] key_alloc+0x88d/0x1280 [ 1340.789267] ? __pfx_key_alloc+0x10/0x10 00:27:09 executing program 3: io_setup(0x3, &(0x7f0000000080)) socket$inet6_tcp(0xa, 0x1, 0x0) r0 = syz_open_dev$mouse(&(0x7f0000000000), 0x3, 0x80000) io_setup(0xfff, &(0x7f0000000040)=0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x8b) io_submit(r1, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)="d3", 0x1}]) r2 = socket$inet6(0xa, 0x1, 0x5) io_submit(r1, 0x2, &(0x7f0000000400)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x5, 0x7fff, r0, &(0x7f0000000200)="2c98493b76f217c57c30f03bf0512fa22d07b465ccacbfcbc3bc6c42ad0375a0059d4d90f1a77212b65a15adc609d331463d1cba64c5d9b6b60fe31f8015d5d93d873e2e0b0297c6b73440ddcd3e99d2e56b140620c70e56a0f1aca6cf4ad5940f9503795ff2", 0x66, 0x9, 0x0, 0x3, r0}, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x5, 0x6, r2, &(0x7f00000002c0)="275299f1d28b8de6389c7e81a98644870c349be5cf523e94942333e82f297c4c5b49507c690654f620412dff67d883e7320f3f69bfa9021115a56d50f0d8903b9a25f7c68d7a8da1740df8a94d78ff007aba77639cb8777eea4428d0a23e3623f2f27ae93a1d18cea6ff81686bd07feda0c40a831419075211d57dcf810d8367ea94c3f5ba5b1459eb75c3cff95fc2dea0381753ee828dd8962a9b2e8497340244ac9f4cbe1506b34e425b90fcded880c56526c212f68fe87542a6aa79c4e5d96ee5094652d2fcb817f71430dbab2910772c9a02a46748837f9648a15fb68796952e8faba55555d803e836db02693df02880a80393a20b155f", 0xf9, 0x7970, 0x0, 0x1}]) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r5 = openat$incfs(r0, &(0x7f0000000040)='.pending_reads\x00', 0x800, 0x22) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000140)={{0x1, 0x1, 0x18, r5, {0x2}}, './file0\x00'}) r7 = syz_open_dev$vcsu(&(0x7f0000000180), 0x3, 0x602103) setsockopt$inet6_tcp_int(r7, 0x6, 0x24, &(0x7f00000001c0)=0x1f, 0x4) syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f00000000c0)={0x0, 0x0, 0x8, 0x7, 0x3ff, r6, 0x0, 0x0, 0x0, 0x0, 0x2}]) 00:27:09 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) [ 1340.789290] ? security_prepare_creds+0x101/0x160 [ 1340.789330] keyring_alloc+0x46/0xc0 [ 1340.789359] lookup_user_key+0xbec/0x12a0 [ 1340.789400] ? __pfx_lookup_user_key+0x10/0x10 [ 1340.789433] ? __might_fault+0xe0/0x190 [ 1340.789457] ? find_held_lock+0x2b/0x80 [ 1340.789481] ? __might_fault+0x138/0x190 [ 1340.789516] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1340.789556] ? _copy_from_user+0x5b/0xd0 [ 1340.789584] ? memdup_user+0x95/0xe0 [ 1340.789621] __do_sys_add_key+0x1d2/0x440 [ 1340.789650] ? __pfx___do_sys_add_key+0x10/0x10 [ 1340.789678] ? syscall_trace_enter+0x1cf/0x240 [ 1340.789708] ? lock_release+0xc8/0x290 [ 1340.789748] do_syscall_64+0xbf/0x390 [ 1340.789778] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1340.789802] RIP: 0033:0x7f6645f24b19 [ 1340.789820] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1340.789841] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1340.789864] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1340.789880] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1340.789894] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1340.789909] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1340.789922] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1340.789956] 00:27:09 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x84000000) 00:27:09 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, 0x0, &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:27 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:27 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, 0x0) r5 = fork() setpgid(r5, r4) 00:27:27 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2, 0x4}, 0x0, 0x0, 0x0, 0x6}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000140)={{0x1, 0x1, 0x18, r0, {0x200800}}, './file0/file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000440)=ANY=[@ANYBLOB="01002000010000001800070000001a2360959c2c8485c073142897994ffb99b98aa9d94e3efae58c4ae59ca86fe4c35a0a606d0a8d15d78193b9f55f0b9bdedad0fd2a0434c6971c030a22a9eeda6f43e5fd6eb8d03a2c2e9bab7574722d814776ca6ca7ef1b70967810c108bef7c0bfbd2735180c08a260ae2798ea5734848e5e18f6b7d99907178ba33feaeb53af252b251ab5ce60304c719c5c66aa6f141831d484251d3f5c6fbfb64e85ac39f51cc503e44388cd37c9c5e30f1ecf3d5043c9a147f85fc0105c538f95c37d4fc5df6b6512625ef6d995955074fd96a738b2a3aab0be3f0497725ce494aa7dffbd9d9815", @ANYRES32=r0, @ANYRES32=r0, @ANYBLOB="00c6ffffff2f66696c4d3000a6af77100b3620e6fe02e001f17aa060a6f1623784b71d18be2915fe430f00a588a9b9a03e78066e195b4b9e65b619bd6eb5b101e6465c5317861b3ea84e7538b1"]) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:27:27 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, 0x0, &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 14) 00:27:27 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:27:27 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x85000000) 00:27:27 executing program 3: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x0, &(0x7f0000000140), &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 15) [ 1358.648149] FAULT_INJECTION: forcing a failure. [ 1358.648149] name failslab, interval 1, probability 0, space 0, times 0 [ 1358.650094] CPU: 0 UID: 0 PID: 95597 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1358.650123] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1358.650134] Call Trace: [ 1358.650141] [ 1358.650148] dump_stack_lvl+0xfa/0x120 [ 1358.650178] should_fail_ex+0x4d7/0x5e0 [ 1358.650207] should_failslab+0xc2/0x120 [ 1358.650234] __kmalloc_cache_noprof+0x81/0x6b0 [ 1358.650268] ? assoc_array_insert+0xe1/0x2ae0 [ 1358.650302] ? __mutex_trylock_common+0xf9/0x260 [ 1358.650338] ? assoc_array_insert+0xe1/0x2ae0 [ 1358.650369] assoc_array_insert+0xe1/0x2ae0 [ 1358.650406] ? __mutex_lock+0x166/0x1020 [ 1358.650428] ? __key_link_lock+0x9c/0xd0 [ 1358.650452] ? __key_link_lock+0x50/0xd0 [ 1358.650477] ? __pfx___mutex_lock+0x10/0x10 [ 1358.650506] ? __pfx_assoc_array_insert+0x10/0x10 [ 1358.650542] ? down_write+0x119/0x1f0 [ 1358.650565] ? __pfx_down_write+0x10/0x10 [ 1358.650596] __key_link_begin+0xf0/0x260 [ 1358.650621] __key_create_or_update+0x47d/0xcd0 [ 1358.650646] ? __pfx___key_create_or_update+0x10/0x10 [ 1358.650677] ? find_held_lock+0x2b/0x80 [ 1358.650705] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1358.650744] key_create_or_update+0x42/0x60 [ 1358.650769] __do_sys_add_key+0x214/0x440 [ 1358.650795] ? __pfx___do_sys_add_key+0x10/0x10 [ 1358.650819] ? syscall_trace_enter+0x1cf/0x240 [ 1358.650846] ? lock_release+0xc8/0x290 [ 1358.650882] do_syscall_64+0xbf/0x390 [ 1358.650908] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1358.650929] RIP: 0033:0x7f6645f24b19 [ 1358.650944] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1358.650963] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1358.650983] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1358.650996] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1358.651008] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1358.651021] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1358.651033] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1358.651064] 00:27:37 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, 0x0, &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:37 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') fork() setpgid(0x0, r4) 00:27:37 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x3f, 0x0, 0x8, 0x1, 0x0, 0x7f, 0x8000, 0xc, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000140), 0xc}, 0x5001, 0x43, 0x7d17, 0x4, 0x7, 0xffffdc7b, 0x80, 0x0, 0xfb94, 0x0, 0x9}, 0xffffffffffffffff, 0xa, r0, 0x1) 00:27:37 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2000) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:27:37 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:27:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 16) 00:27:37 executing program 4: r0 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x7b, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup2(r0, 0xffffffffffffffff) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001ac0)='/proc/diskstats\x00', 0x0, 0x0) syz_io_uring_setup(0x74a5, &(0x7f0000001ec0)={0x0, 0x0, 0x20, 0x0, 0x0, 0x0, r2}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000001f40), &(0x7f0000001f80)) r3 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000140), r1) pread64(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, 0x0, 0x8, 0xffffffffffffffff, 0x4) sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) pread64(0xffffffffffffffff, &(0x7f0000000d00)=""/142, 0x8e, 0x1) sendmsg$IPVS_CMD_SET_SERVICE(r2, &(0x7f0000000200)={&(0x7f00000000c0)={0x10, 0x0, 0x0, 0x80}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYBLOB="050000b2", @ANYRES16=r3, @ANYBLOB="00082bbd7000fedbdfb8bb15678813d37cc123a7c22e3c8425020000001c0002800800040066d615ff0700040002000000735f9e16a98ddf"], 0x30}, 0x1, 0x0, 0x0, 0x48004}, 0x40020d4) sendmsg$IPVS_CMD_SET_DEST(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x100000}, 0xc, &(0x7f00000001c0)={&(0x7f00000007c0)=ANY=[@ANYBLOB="d8000000318b8894bd9078a22c472425f60b5c7a5814f0ff022e0e69", @ANYRES16=r3, @ANYBLOB="10002bbd7000fbdbdf25060000005a60b4ba65dcdbd701000000060002000c0000000800080001000080060001000200000014000300ac1414bb000000000000000000000000200001801400030000000000000000000000ffffac1414aa06000200330000000800060009000000080006000800000014000280080000080000000000060002004e2000003800038006000400000100000800010000000000060004000500000008000500ac1414aa1400060000000000000000000000000000000000080005000900000008000400080000"], 0xd8}, 0x1, 0x0, 0x0, 0x4040}, 0x4000000) pipe2(&(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(r4, 0x0, &(0x7f0000000740)=[{&(0x7f0000002b00)=""/4096, 0x1000}, {&(0x7f00000002c0)=""/54, 0x36}, {&(0x7f0000000300)=""/20, 0x14}, {&(0x7f00000003c0)=""/242, 0xf2}, {&(0x7f00000004c0)=""/197, 0xc5}, {&(0x7f0000003b00)=""/4096, 0x1000}, {&(0x7f00000005c0)=""/255, 0xff}, {&(0x7f00000006c0)=""/100, 0x64}], 0x8) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x7a, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r5 = syz_open_dev$sg(&(0x7f0000002ac0), 0x0, 0x0) r6 = dup(r5) ioctl$SG_IO(r6, 0x2203, &(0x7f00000010c0)={0x0, 0x0, 0x0, 0x0, @buffer={0x9, 0x0, 0x0}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) r7 = syz_open_dev$tty1(0xc, 0x4, 0x2) r8 = dup3(r5, r7, 0x80000) ioctl$BTRFS_IOC_GET_DEV_STATS(r8, 0xc4089434, &(0x7f00000008c0)={0x0, 0x9, 0x0, [0x8ebd, 0x80, 0x0, 0x3, 0x1000], [0x7fff, 0x1, 0x200, 0x7b, 0x100000000, 0x8, 0x10001, 0x20, 0x6, 0x7, 0x8000, 0x2, 0x8, 0x3ff, 0x6, 0x1f, 0xfffffffffffffffb, 0x7, 0x6, 0x4c85b1c7, 0x81, 0x8, 0x1, 0x845, 0x1000, 0x0, 0x0, 0x3, 0x40, 0x7, 0x6, 0xd96c, 0x8, 0x9, 0x3f, 0xfff, 0x7f, 0xcf4, 0xfffffffeffffffff, 0x2, 0xffffffffffffff7f, 0x3, 0x4, 0xdfd, 0x8, 0x7366, 0x9, 0x2429, 0x348b, 0x100, 0x2, 0x9, 0x1000, 0x1f, 0x6, 0x1, 0x2, 0x80000001, 0x5, 0x9, 0x4, 0x3, 0x4, 0x5, 0xff, 0x8, 0x80, 0x2, 0x9, 0x1, 0x4ca2a7e6, 0x0, 0x7, 0x7, 0x20, 0x34b, 0xffffffffffffffbb, 0x8, 0x7fff, 0x6, 0x2, 0x5, 0x5, 0x6, 0x9, 0x8, 0x80000000, 0x2, 0xfffffffffffffff9, 0x60, 0x100, 0x6, 0x9, 0x2, 0x6, 0x200, 0x5, 0x4, 0x18b60000000000, 0x9, 0x69, 0x2, 0x0, 0x8, 0x7, 0xffc0000000000000, 0x5, 0x7, 0xd9d, 0x2, 0x3, 0xa0, 0x5, 0x7ff, 0x7fffffff, 0x9, 0x2, 0xfffffffffffffffb, 0x8, 0x7, 0x40]}) 00:27:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x86000000) 00:27:37 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="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"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:27:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 17) [ 1368.747357] FAULT_INJECTION: forcing a failure. [ 1368.747357] name failslab, interval 1, probability 0, space 0, times 0 [ 1368.748414] CPU: 0 UID: 0 PID: 96375 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1368.748431] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 00:27:37 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, 0x0, &(0x7f0000000200), &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) [ 1368.748438] Call Trace: [ 1368.748443] [ 1368.748448] dump_stack_lvl+0xfa/0x120 [ 1368.748467] should_fail_ex+0x4d7/0x5e0 [ 1368.748489] should_failslab+0xc2/0x120 [ 1368.748507] __kmalloc_cache_noprof+0x81/0x6b0 [ 1368.748526] ? assoc_array_walk.isra.0+0x1d0/0x5c0 [ 1368.748546] ? assoc_array_insert+0x3c9/0x2ae0 [ 1368.748567] ? assoc_array_insert+0x3c9/0x2ae0 [ 1368.748586] assoc_array_insert+0x3c9/0x2ae0 [ 1368.748608] ? __mutex_lock+0x166/0x1020 [ 1368.748621] ? __key_link_lock+0x9c/0xd0 [ 1368.748636] ? __key_link_lock+0x50/0xd0 [ 1368.748651] ? __pfx___mutex_lock+0x10/0x10 [ 1368.748663] ? __pfx_assoc_array_insert+0x10/0x10 [ 1368.748684] ? down_write+0x119/0x1f0 [ 1368.748698] ? __pfx_down_write+0x10/0x10 [ 1368.748716] __key_link_begin+0xf0/0x260 [ 1368.748731] __key_create_or_update+0x47d/0xcd0 [ 1368.748746] ? __pfx___key_create_or_update+0x10/0x10 [ 1368.748764] ? find_held_lock+0x2b/0x80 [ 1368.748782] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1368.748805] key_create_or_update+0x42/0x60 [ 1368.748820] __do_sys_add_key+0x214/0x440 [ 1368.748835] ? __pfx___do_sys_add_key+0x10/0x10 [ 1368.748849] ? syscall_trace_enter+0x1cf/0x240 [ 1368.748866] ? lock_release+0xc8/0x290 [ 1368.748887] do_syscall_64+0xbf/0x390 [ 1368.748903] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1368.748916] RIP: 0033:0x7f6645f24b19 [ 1368.748925] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1368.748936] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1368.748948] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1368.748956] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1368.748964] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1368.748971] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1368.748978] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1368.748996] 00:27:37 executing program 3: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f00000016c0)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184039dec11440b3e48a1e7da90d66139125010020ccdd01fdd080582c9a357603f914afba1b6ea392f2fcb41548673044f36e3362b2a2d9a21c6a4a798629791e5167d33e25f942f6b252f62d5000000000000"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x1000) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000400)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000003c0)=0xff28) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000001b00)=ANY=[@ANYBLOB="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"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) r6 = socket$nl_generic(0x10, 0x3, 0x10) r7 = dup(r6) r8 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xeb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r8) r9 = openat$null(0xffffffffffffff9c, &(0x7f0000000380), 0x101000, 0x0) perf_event_open(&(0x7f0000001740)={0x3, 0x80, 0x1, 0x8, 0xef, 0x7f, 0x0, 0x630, 0x282, 0xd, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000340), 0x2}, 0x4212, 0x7f, 0x9, 0x6, 0x4, 0x0, 0x3, 0x0, 0x1, 0x0, 0x2}, 0xffffffffffffffff, 0xd, r9, 0x0) inotify_add_watch(r7, &(0x7f00000001c0)='./file0\x00', 0x2000000) 00:27:37 executing program 1: perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r0, &(0x7f0000001200)=""/135, 0x87, 0x87000000) 00:27:37 executing program 6: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) uname(&(0x7f0000000400)) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f00000000c0)='./cgroup.net/syz1\x00', 0x1ff) perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000080), 0xc}, 0xc264, 0x3, 0x0, 0x7, 0x0, 0x8, 0x81, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000480)='./cgroup.cpu/syz1\x00', 0x1ff) r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000080), 0x1, 0x0) r1 = socket$nl_xfrm(0x10, 0x3, 0x6) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000580)='./cgroup.net/syz1\x00', 0x1ff) pidfd_getfd(0xffffffffffffffff, r2, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/syz1\x00', 0x1ff) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r1, 0xc0502100, &(0x7f00000005c0)={0x0, 0x0}) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000440)='./cgroup.cpu/syz0\x00', 0x1ff) clone3(&(0x7f0000005880)={0x7b804100, 0x0, &(0x7f0000000280), 0x0, {0x1e}, 0x0, 0x0, &(0x7f0000000240)=""/10, 0x0}, 0x58) getpgid(r3) clone3(&(0x7f00000004c0)={0x100, &(0x7f0000000140), 0x0, &(0x7f00000002c0), {0x38}, &(0x7f0000000300)=""/68, 0x44, &(0x7f0000000380)=""/75, &(0x7f00000001c0)=[0x0, 0x0], 0x2, {r2}}, 0x58) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000540)='./cgroup/syz0\x00', 0x1ff) fchmod(0xffffffffffffffff, 0x82) io_setup(0x20e, &(0x7f0000000000)) 00:27:37 executing program 7: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) dup(r0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) recvmsg$unix(r2, &(0x7f0000001d40)={&(0x7f0000001a40)=@abs, 0x6e, &(0x7f0000001c40)=[{&(0x7f0000001ac0)=""/18, 0x12}, {&(0x7f0000001b00)=""/122, 0x7a}, {&(0x7f0000001b80)=""/9, 0x9}, {&(0x7f0000001bc0)=""/88, 0x58}], 0x4, &(0x7f0000001c80)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xc0}, 0x2021) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) recvmsg$unix(0xffffffffffffffff, &(0x7f0000001940)={&(0x7f0000001400), 0x6e, &(0x7f0000001840)=[{&(0x7f0000001480)=""/255, 0xff}, {&(0x7f0000001580)=""/163, 0xa3}, {&(0x7f0000001640)=""/86, 0x56}, {&(0x7f00000016c0)=""/129, 0x81}, {&(0x7f0000001780)=""/148, 0x94}], 0x5, &(0x7f00000018c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x14, 0x1, 0x1, [0xffffffffffffffff]}}], 0x58}, 0x2000) acct(&(0x7f0000001a00)='./file0\x00') syz_mount_image$nfs(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0xd72a, 0x3, &(0x7f0000001380)=[{&(0x7f0000001e00)="785833665da78a43c3427797985f07052f3a62eba97b80af4e54101aee6d421bd9263a5bb0b81f1c1dbcd924139bce2dd15fdbaa2b8e3cb0d4382bc4302abd5d0d2e2f15c043eab4424f0d3375b02c433d0b38d797f0cb4bcb2ecf0f734206a5fca8de6a201ea6074548d5b4bd016865f4931decabca906db84f2fbc525221fe9045c92805d829ac2e9d4273213a40eb0903a401e51d96b7e0e6f3a0b8f43b6d75d0da8b", 0xa4, 0x8}, {&(0x7f0000000280)="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", 0x1000, 0x7}, {&(0x7f0000001280)="c471c8f21d0d175c070143bc4068e87dcb43793f2c7151be71fdd12332d3a9f8fb82099f027e841ab609b9667898b98d26a9416498295bca79f5569e27079b0f6787a91779f18d9e4ae73b6e28e445b10cbd112f872b6f43df8f5d332d8b4cf043444a6b0d2d6b5e60729f62dc601156ad1dfc3a00d6fa32ec5b0af9c788ccc4b6b073bdc20a4fb24827c1856082b67ef0bd5712b50367987c83e1e8135ff7c0f10cf873906bf82b23a04a161b5ee82c7c87011a48941b53d6a444aa32d801337f4bd67d205561e4749168647af631b7ca1c5772bc5da4418950e4be3adea879", 0xe0, 0x1}], 0x5, &(0x7f0000001d80)={[{',}$'}, {'!#\\@:[,!@\xfd'}], [{@appraise}, {@mask={'mask', 0x3d, 'MAY_EXEC'}}, {@defcontext={'defcontext', 0x3d, 'unconfined_u'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@subj_user={'subj_user', 0x3d, ',}$'}}]}) 00:27:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 18) 00:27:37 executing program 5: sendmsg$AUDIT_TTY_SET(0xffffffffffffffff, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f00000085c0)={0x0, 0x0, 0x0}, &(0x7f0000008600)=0xc) setregid(r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000200)=ANY=[@ANYBLOB="77fae4902d648e8153be9e9c53206e8b0e9032994e0d641ae5c2aa4262a852627f2d6af41ebb5706601f7cdc47f3ce427ef1ad21e46aaea75a05cdb7d14ba0fe3ce3725046c39f208ce44c5eb2fd6dc05804e601524e", @ANYRES32, @ANYRES32=0xee01, @ANYRES32=r1, @ANYBLOB='./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000000)='maps\x00') r3 = perf_event_open(&(0x7f0000000340)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x11, r3, 0x0) lseek(r2, 0xd20e, 0x0) r4 = gettid() syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') fork() setpgid(0x0, r4) 00:27:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 19) 00:27:37 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe(&(0x7f0000000040)={0xffffffffffffffff}) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) mount$9p_fd(0x0, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) ioctl$F2FS_IOC_RESIZE_FS(r1, 0x4008f510, &(0x7f0000000000)=0xc64) lstat(&(0x7f00000015c0)='./file0\x00', &(0x7f0000001600)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) mkdirat(r4, &(0x7f0000001740)='./file0\x00', 0x27) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f00000001c0)='./file0\x00', 0x3, 0x6, &(0x7f0000001500)=[{&(0x7f0000000200)="499f38415c34fdcc464e8ed540e41f387e430cc7ccba57c246e851fed305074935df6a3d01f3f8f7641077e4abe56f9c479c39fed7b225c92a8ba7db8c84bb74fa2aca7f4033761a8b59a1053564c43e4418900efecd11c578ceaf385a7dadb6d8398b8ffce071b1354663690c396f5bea3428b30f038163dc728584051ac5f77ac10f5b82cd782f73465404eb872f9f32f7d07540bcdc5fc2212eee9c896eb84a54519eaa7fdf373ada4c8f22c86ca578e3f59c48a3f140b216c0562d51d601014f63fbf961cff66377e01383a6138f3083c894a49f0706030bc4c58a39dd90042f0723", 0xe4, 0x1}, {&(0x7f0000000300)="1b927b591be9239167b6bd8353473000849860a31433f9d4317d3f462d910001045d655e13e089d25b8dce2f7c1c5c6c8f5d47e3e9606e35966280e39e476002f8a0ca103824bddc8c92ed88d5db1c9bd17e3fd806efa18582c3a1dcc94596e1167a42cb15663865ec23e708ef6e64691dd68bf7b34e18cc1ac221482d51c53f4d39d1b7394df17028e718af5b8a8bc473eefc8133c9945ec242819e4f2a12cba8893aadd11fc898aed0ef83b9abdb88f0080ab9682c81efe0f23e9250dcfc187baa3886bcceb79a2e9a23a3da93e50de21264be552bc6cd88876ef0fe3e05fa7f7d3deb28a19c", 0xe7, 0xa000000000000}, {&(0x7f0000000400)="c4885a274b632f788ac44d783dfcc2fff461e2f16f45b8ab7d9bde", 0x1b, 0x100000000}, {&(0x7f0000000440)="e9ec10c84417b948051ff5ea11404efb0e4eed8f7fc5573ebb7d9042b44f0a19f3127066784ea7ed54fe13b77917f5d6edf414c290e513fb85ceb6b5650041e51f2ee16d8936bc203e36d5e7b120b846a5d2e7", 0x53, 0x5}, {&(0x7f00000004c0)="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", 0x1000}, {&(0x7f00000014c0)="a8bbbf9dab878dbb5a3e5eeaf6a1ef138a9fedb6bcd4e52ee0f2eaf35af3aa", 0x1f, 0x8}], 0x2000000, &(0x7f0000001680)={[{@shortname_win95}, {@shortname_win95}, {@shortname_win95}, {@uni_xlate}, {@fat=@errors_continue}], [{@euid_eq={'euid', 0x3d, r2}}, {@dont_appraise}, {@smackfsdef={'smackfsdef', 0x3d, '\\\\$\''}}, {@obj_role={'obj_role', 0x3d, '}'}}]}) 00:27:37 executing program 3: socketpair$unix(0x1, 0x2, 0x0, 0x0) io_setup(0x208, &(0x7f0000000080)) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000100)=ANY=[], 0x8b) io_submit(0x0, 0x1, &(0x7f0000000040)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, 0xffffffffffffffff, &(0x7f00000000c0)="d3", 0x1}]) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/mdstat\x00', 0x0, 0x0) r1 = gettid() r2 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r2, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r2, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0xffff, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_config_ext={0xbf6, 0x2}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r1, 0x8, r2, 0x4) sendmsg$AUDIT_TTY_SET(r2, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) r3 = gettid() r4 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r4, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r4, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0xa0080, 0xf, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r3, 0x8, r4, 0x4) sendmsg$AUDIT_TTY_SET(r4, &(0x7f00000011c0)={&(0x7f0000001100)={0x10, 0x0, 0x0, 0x80000}, 0xc, &(0x7f0000001180)={&(0x7f0000001140)={0x18, 0x3f9, 0x200, 0x70bd27, 0x25dfdbfb, {0x0, 0x1}, ["", "", "", ""]}, 0x18}, 0x1, 0x0, 0x0, 0x4001}, 0x20040800) io_submit(0x0, 0x4, &(0x7f0000000480)=[&(0x7f0000000040)={0x0, 0x0, 0x0, 0x5, 0xaf7d, r0, &(0x7f0000000100)="b03cd33cec5a7bfcd6fa9849e6a7eeb63e9b3fa1044203c059f35f66f085b8343ce0963fd955eb3f541846a9900365873b55ee241d14257d68e8b69c587fd04cf4687f966565aabd8406877407aedc9abadfba143e5887dbd2f510723997b2ad7513dc6d5e5640d26c50ce76d9847f0bebc5f54c9185", 0x76, 0x3, 0x0, 0x2}, &(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x9, 0xffffffffffffffff, &(0x7f0000000180)="fe787984b0a1012d7040696363408d9b15eb7535a40f6cf445e9382cd360f75604cacd6f1c5f8d99059f2cc29bcb596366b0358546f0bedcd3e0970bbe3a35bfa6c6c68e8ff1ed6d71ba79a30c5aafcd9c4c6ecefef20ed6fca26c29a26c69626aacd563f888a1ce5c7bfdd1a20af04056da743a0b6363ca584e78bcbf5f1a127f105d24fd7ff2b368848a738edd9d18288a8ef991859c2b2db477ba7fd77f23dd2dd76da97797aa3db511ebbac566e9815e5f4cc12e3900fa022e87c0ad522d86da8f4960e2a5c5e908bb2e811de4e5072eb56be56b64265a83854359853c5483390199f1badcff8667862ed8228eb27e32", 0xf2, 0x3, 0x0, 0x0, r2}, &(0x7f0000000380)={0x0, 0x0, 0x0, 0x3, 0x9, 0xffffffffffffffff, &(0x7f00000002c0)="68dc2d7eb4b7406e5d6e270130737cede34d27f99b41a1870f77e8018a3ac1567d417379c5d3b7d2546f0289e8c3a67d4f2c5072d61125dc46250958431929eebd7994d0a64258919f05f999107c2707eb54654bb7c621f5ca50d45e5511e38d335182fe442e21a4e9c825a859f0c2d1b427c3d1fcc246048f8d6d1c4f4a350f14a7cbad0c26d67b52be33ee96cde2b4bd5344d650", 0x95, 0x3ff, 0x0, 0x1, r4}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0xa5, 0xffffffffffffffff, &(0x7f0000000400)="2a0543281f79bc154642704795ea6c26313fe254f97502661a5b2a106877b9", 0x1f, 0x400, 0x0, 0x1}]) r5 = creat(&(0x7f00000003c0)='./file0\x00', 0x0) ioctl$FS_IOC_RESVSP(r5, 0x40305828, &(0x7f00000000c0)={0x0, 0x2, 0x5, 0x10000002}) [ 1369.133264] FAULT_INJECTION: forcing a failure. [ 1369.133264] name failslab, interval 1, probability 0, space 0, times 0 [ 1369.134333] CPU: 0 UID: 0 PID: 96994 Comm: syz-executor.2 Not tainted 6.18.0-rc1-next-20251017 #1 PREEMPT(voluntary) [ 1369.134349] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1369.134357] Call Trace: [ 1369.134362] [ 1369.134367] dump_stack_lvl+0xfa/0x120 [ 1369.134386] should_fail_ex+0x4d7/0x5e0 [ 1369.134404] ? key_alloc+0x3e1/0x1280 [ 1369.134415] should_failslab+0xc2/0x120 [ 1369.134432] kmem_cache_alloc_noprof+0x80/0x690 [ 1369.134457] ? key_alloc+0x3e1/0x1280 [ 1369.134466] key_alloc+0x3e1/0x1280 [ 1369.134488] ? __pfx_key_alloc+0x10/0x10 [ 1369.134499] ? security_key_permission+0x27/0xa0 [ 1369.134518] __key_create_or_update+0x6fc/0xcd0 [ 1369.134534] ? __pfx___key_create_or_update+0x10/0x10 [ 1369.134551] ? find_held_lock+0x2b/0x80 [ 1369.134569] ? __pfx_lookup_user_key_possessed+0x10/0x10 [ 1369.134593] key_create_or_update+0x42/0x60 [ 1369.134607] __do_sys_add_key+0x214/0x440 [ 1369.134622] ? __pfx___do_sys_add_key+0x10/0x10 [ 1369.134636] ? syscall_trace_enter+0x1cf/0x240 [ 1369.134653] ? lock_release+0xc8/0x290 [ 1369.134675] do_syscall_64+0xbf/0x390 [ 1369.134692] entry_SYSCALL_64_after_hwframe+0x77/0x7f [ 1369.134705] RIP: 0033:0x7f6645f24b19 [ 1369.134714] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1369.134726] RSP: 002b:00007f664349a188 EFLAGS: 00000246 ORIG_RAX: 00000000000000f8 [ 1369.134738] RAX: ffffffffffffffda RBX: 00007f6646037f60 RCX: 00007f6645f24b19 [ 1369.134746] RDX: 0000000000000000 RSI: 00000000200001c0 RDI: 0000000020000180 [ 1369.134753] RBP: 00007f664349a1d0 R08: ffffffffffffffff R09: 0000000000000000 [ 1369.134761] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 1369.134768] R13: 00007ffd6d081baf R14: 00007f664349a300 R15: 0000000000022000 [ 1369.134786] 00:27:37 executing program 0: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001", 0x25}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0f", 0xc, 0x4000}], 0x0, &(0x7f0000000340)=ANY=[@ANYBLOB="00f78622783d23fc238afc2047c1c4ef60e4073b654e3f052cdb0fbc7316bbe0abaceaeb810000007184f79cec11440b3e48a1e7da90d66139125010023c741f690748b91038a38eafdc71"]) newfstatat(0xffffffffffffff9c, 0x0, &(0x7f0000002640)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x100) mkdirat(r1, &(0x7f0000000240)='./file0\x00', 0xa4) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) fchown(r1, r2, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', &(0x7f00000002c0), 0x0) fchown(0xffffffffffffffff, 0x0, 0x0) mkdirat(r1, &(0x7f00000001c0)='./file0\x00', 0xb0) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f00000016c0)={{{@in=@private, @in=@multicast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@multicast1}, 0x0, @in=@local}}, &(0x7f00000017c0)=0xe8) mount$9p_fd(0x0, &(0x7f0000001640)='./file0\x00', &(0x7f0000001680), 0x42800, &(0x7f0000001800)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@loose}], [{@measure}, {@uid_lt={'uid<', r3}}, {@permit_directio}]}}) r4 = fork() r5 = syz_mount_image$msdos(&(0x7f0000000140), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, &(0x7f0000000580), 0x11000a6, &(0x7f0000000500)=ANY=[@ANYBLOB="646f74732c646d61736b3d30304030303030303030303030303030303030303137372c646f74732c646f74732c6e6f646f74732c009426ca11b7717bde99bd88adfdedef04a6f07e2326ee4b5e8bf90eec4390e1ce0465c008b3091ef563ea1570c60e98975d9c3a5b186db43dffed95238726258c51293b72c1738a70234301f8e5961e8a4a2a6c1f8c7dcb143924268abc4692553ed54f251e0b2040e153a59536a3fac0652fcd566ea66a366e933a29dcd767a79952a4ec5882ed891f55d902c7092426ed800ba98b680ebd515db2eb13065e39cfc45706c59fedd297b3a80fb3d22f2bc17a35c017d7f71a7fcd4cd3632f969a3be0c4299c541325c57bcbb46e2c80478ad4d3bc3f5b1ceb3871bf1763a6929559312d9cb16dc1865470b3b773af76973487d0cad42474f2ef4c67d300"/320]) r6 = add_key$fscrypt_provisioning(&(0x7f00000003c0), &(0x7f0000000400)={'syz', 0x2}, &(0x7f0000001880)=ANY=[@ANYBLOB="0200514e000083de911181432c7d530eb259b3000000"], 0x9, 0xfffffffffffffff8) ioctl$FS_IOC_ADD_ENCRYPTION_KEY(r1, 0xc0506617, &(0x7f0000000480)=ANY=[@ANYBLOB="0200000000000000000000000000000000000000000000000000000000000000000000000000000021000000", @ANYRES32=r6, @ANYBLOB="00000000000000000000000000000000000000000000000000000100000000006162636465666768696a6b6c6d6e6f707172737475767778797a30313233343536"]) ioctl$BTRFS_IOC_RM_DEV_V2(r0, 0x5000943a, &(0x7f0000000640)={{r5}, 0x0, 0x4, @unused=[0x6, 0x1f, 0xc62, 0x6], @devid}) socket$nl_generic(0x10, 0x3, 0x10) dup(r1) r7 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x52, 0x0, 0x0, 0x0, 0x0, 0x0, 0x13, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1f}, 0x0, 0x0, 0xfffffffd, 0x9, 0x0, 0x0, 0x80}, r4, 0x0, 0xffffffffffffffff, 0x0) dup(r7) 00:27:37 executing program 7: perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0xea, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = syz_open_procfs(0x0, &(0x7f0000000140)='net/snmp6\x00') pread64(r1, &(0x7f0000001200)=""/135, 0x87, 0x0) pread64(r1, &(0x7f0000000040)=""/169, 0xa9, 0x8000) perf_event_open(&(0x7f0000000000)={0x0, 0x80, 0x0, 0x6, 0x6, 0x4, 0x0, 0x8, 0x1000, 0x6, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x6, 0x0, @perf_bp={&(0x7f0000000100), 0x3}, 0x11890, 0x1f, 0x2006, 0x9, 0x6, 0x3ff, 0x9, 0x0, 0x6, 0x0, 0x1}, r0, 0x8, r1, 0x4) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f00000001c0), 0x32281, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x3, 0x9, 0x1, 0x1, 0x0, 0x0, 0x80200, 0x2, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x8001, 0x6, @perf_config_ext={0x0, 0x7fffffff}, 0x8, 0xfffffffffffffe00, 0x4, 0x3, 0x3, 0x4, 0x1, 0x0, 0x7, 0x0, 0x6}, r0, 0x9, r2, 0xb) syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) statfs(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)=""/31) 00:27:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xb0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) add_key$keyring(&(0x7f0000000180), &(0x7f00000001c0)={'syz', 0x2}, 0x0, 0x0, 0xffffffffffffffff) (fail_nth: 20) VM DIAGNOSIS: 00:32:46 Registers: info registers vcpu 0 RAX=00000000007f0b8b RBX=0000000000000000 RCX=ffffffff84c4ac97 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814cbdd0 RBP=dffffc0000000000 RSP=ffffffff85c07e00 R8 =0000000000000001 R9 =ffffed100d9c630a R10=ffff88806ce31853 R11=0000000000000001 R12=ffffffff86645d50 R13=1ffffffff0b80fc7 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84c4998e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e53f9000 00000000 00000000 LDT=0000 fffffe6d00000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fb44cacc030 CR3=000000000c9ab000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=00000000000000000000000000000000 XMM02=000000000000000040e7110000000000 XMM03=0000ff00000000000000000000000000 XMM04=732f6c61636f6c2f7273752f3d485441 XMM05=622f6c61636f6c2f7273752f3a6e6962 XMM06=73752f3a6e6962732f7273752f3a6e69 XMM07=6e69622f3a6e6962732f3a6e69622f72 XMM08=00000000000000000000000000000000 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000859cf3 RBX=0000000000000001 RCX=ffffffff84c4ac97 RDX=0000000000000000 RSI=0000000000000000 RDI=ffffffff814cbdd0 RBP=dffffc0000000000 RSP=ffff8880096efe58 R8 =0000000000000001 R9 =ffffed100d9e630a R10=ffff88806cf31853 R11=0000000000000001 R12=ffffffff86645d50 R13=1ffff110012ddfd2 R14=0000000000000000 R15=0000000000000000 RIP=ffffffff84c4998e RFL=00000206 [-----P-] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff8880e54f9000 00000000 00000000 LDT=0000 fffffe2500000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000556df23c8618 CR3=000000000c9ab000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 XMM00=00000000000000000000000000000000 XMM01=000000c000068320000000c000055dd0 XMM02=000000c000068280000000c000068230 XMM03=000000c0002f6030000000c0000682d0 XMM04=000000c0001498c0000000c000149890 XMM05=000000c000149920000000c0001498f0 XMM06=000000c000149980000000c000149950 XMM07=000000c00008f740000000c0001499b0 XMM08=000000c0001499e0000000c00008f740 XMM09=000000c000149a40000000c000149a10 XMM10=000000c000149aa0000000c000149a70 XMM11=000000c000149b00000000c000149ad0 XMM12=000000c000149b60000000c000149b30 XMM13=000000c00008f770000000c000149b90 XMM14=000000c000149bf0000000c000149bc0 XMM15=000000c000157e40000000c000149c20