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", 0x1000) 20:19:52 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) [ 212.054200] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4235 comm=syz-executor.0 20:19:52 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r2, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r4, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r5, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r3}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r5}}]}}) sendfile(r1, r2, 0x0, 0x0) 20:19:52 executing program 7: r0 = syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x2, &(0x7f0000000580)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}, {&(0x7f0000000600)="5ceb4f32da1c8bbf1fa3792ebad7b2852c02bbb9a5cf453d180391c64923a6333aab11781be09aee882388a427f79fc304c63645ca56d2c8f198cc828c9710565525f2632f91caeaee5bfe47d3517650a7080fa87aee8535b3d6546aba679091932c461a795aae967ff962b2e8e0293da7111ee64f823a944df4f37bbe2984bc86bac6921d6bc5c50a0c008f71c023b2cc19fe8090c08b1a29ac44b7220eec1f10ae7e12f84450089893ea9da7429d8e87e7a08feb3f2ed600b1491cdc399a1dddfe6bdb2a221cf595944fc3220cbece18c0e27e0b2b3aafe5e1", 0xda, 0x2}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESHEX, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f616a5f747970653d25f40cc7ca0881a027bf6b16200e3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574c6f66863d33ba7cf87e76c310f6c1793653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60fc859e7d2cc9930d284020ca41ddabc816c2385525b5ec9aabdd9b0524473f505a0b9905974f448ea678018e0712"]) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(0xffffffffffffffff, 0xc018937d, &(0x7f0000000500)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) write$P9_RREADDIR(r1, &(0x7f0000000540)={0x2a, 0x29, 0x2, {0x5, [{{0x20, 0x1}, 0xb3a, 0x8, 0x7, './file0'}]}}, 0x2a) r2 = syz_mount_image$iso9660(&(0x7f00000000c0), 0x0, 0x35a6d624, 0x1, &(0x7f00000005c0)=[{&(0x7f0000000240)="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", 0x107}], 0x0, &(0x7f0000000700)=ANY=[@ANYBLOB='map=off,overriderockperm,check=relaxed,smackfsdef=euid>,mask=^MAY_WRITE,euid>', @ANYRESDEC=0x0, @ANYBLOB="00005cb99c782ee4eba5329c5a183a7f0789f946e166a891cad2911339b11939b40350e538260ae796d4beca2779b41f4f426fcfd50f52b571d079b88658601bd77bdc99b4f7ad7f00277af72a7f35bdf1581a4648cdd5000000000000000000010000009ebfeee6d904fcb780306ecb4d8a20745694375dd0b6af"]) move_mount(r2, &(0x7f0000000140)='./file0\x00', r0, &(0x7f00000004c0)='./file0\x00', 0x50) openat$dir(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x40040, 0x138) 20:19:52 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) r2 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_802154(r2, 0x8933, &(0x7f0000000180)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_GET_WPAN_PHY(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000140)={&(0x7f00000000c0)={0x1c, r1, 0x323, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) sendmsg$NL802154_CMD_SET_BACKOFF_EXPONENT(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000240), 0xc, &(0x7f0000000380)={&(0x7f0000000300)={0x54, 0x0, 0x2, 0x70bd2a, 0x25dfdbfc, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x200000002}, @NL802154_ATTR_MAX_BE={0x5, 0x10, 0x7}, @NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x300000003}, @NL802154_ATTR_MAX_BE={0x5}, @NL802154_ATTR_MAX_BE={0x5}, @NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x54}, 0x1, 0x0, 0x0, 0x20000000}, 0x8000) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat$null(0xffffffffffffff9c, 0x0, 0x80800, 0x0) openat$snapshot(0xffffffffffffff9c, 0x0, 0x200141, 0x0) openat(r4, &(0x7f0000000040)='./file1\x00', 0x10400, 0x8) syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) fcntl$getownex(r4, 0x10, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x8084, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0x1, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, &(0x7f0000000100)=@alg={0x26, 'aead\x00', 0x0, 0x0, 'gcm(aes-arm64)\x00'}, 0x80) r6 = creat(&(0x7f00000001c0)='./file1\x00', 0x40) ioctl$BTRFS_IOC_START_SYNC(r6, 0x80089418, &(0x7f0000000200)) recvmmsg(0xffffffffffffffff, &(0x7f0000003980)=[{{0x0, 0x0, 0x0}, 0x3}], 0x1, 0x0, 0x0) pwrite64(r5, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 20:19:52 executing program 1: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000100)=0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(0xffffffffffffffff, 0xc0189373, &(0x7f0000000300)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x3ff}}, './file0\x00'}) ioctl$sock_SIOCSIFBR(r1, 0x8941, &(0x7f0000000380)=@add_del={0x2, &(0x7f0000000340)='gretap0\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$RTC_IRQP_SET(0xffffffffffffffff, 0x4008700c, 0x0) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe69, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000000)={'\x00', 0x0, 0x1, 0xd6c2}) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) r5 = getpid() ioctl$BLKTRACESETUP(0xffffffffffffffff, 0xc0481273, &(0x7f0000000500)={'\x00', 0x1f, 0x81, 0x0, 0x7, 0x5, r5}) r6 = dup3(r1, r3, 0x80000) bind$802154_raw(r6, &(0x7f00000003c0)={0x24, @none={0x0, 0xffff}}, 0x14) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x24, &(0x7f0000000180)={@multicast2, @private=0xac141400}, 0xc) getsockopt$inet_IP_XFRM_POLICY(r2, 0x0, 0x11, &(0x7f0000000400)={{{@in6=@dev, @in6=@ipv4={""/10, ""/2, @initdev}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@mcast1}, 0x0, @in=@empty}}, &(0x7f00000001c0)=0xe8) read(0xffffffffffffffff, &(0x7f0000000140)=""/78, 0x4e) r8 = syz_mount_image$nfs(&(0x7f0000000b40), &(0x7f0000000200)='./file0\x00', 0x9, 0xaaaabe7, &(0x7f0000000e00)=[{&(0x7f0000000bc0)="225f94ef6648630b746b10278b0352407e898ef2d5a5bae63038e0c75d9b6303d9d0114fd208f6d88cf6e9ced15b99002b0190069e6e255d4b9c1384bc0e4e5359082ee791fb057d4c56acd129c97dd1764d0e73ad7f5a8fc314a67b1a0ea37184e7aac8a4e4765166246c5427542b881d5c83010a053e9d19ec02e2c729e1b8ba138bfe75ad3a0c1639fd5589c8710e", 0x90, 0x8}, {&(0x7f0000000c80)="2980f83325669d82da1523cd705773e3c2d615c863a2a287f530016f81c0857a86c7a96e576a3f3e48646eb69310c6ed3fcc0c40084099c64cd9628dc00848aa732be89f0912c6cbf5cb84016a20cabecaf194c0e68b89860ac3d93d2c59d1ac56e1361a0e0296713cf9c575d5e90412f941f9893555056865a93e87604b85a0017b2c29838dbdd98900dcf09781ba", 0x8f, 0x4}, {&(0x7f0000000d40)="f4e3c2064ea6b4880f0597d13070bbfbc912df9dac033b47e6ab20d2675ef331c657c27cc6ab4017d6b5629bff144a7b0cbda83c8beb8bc336c9496f", 0x3c, 0x8001}, {&(0x7f0000000d80)="7d07d3410f6149efa9db89ca868dae608a0ea85452758415b6c0b33321ca9e709bd158b4728b9c339447990c8d0909c12c2ce8d5ef7dccb336e22cd225c14a4f6fa2cbcb5f1e42db5b0e81541e0c58e7c21efc81c2653893f8ba1c3523afdcc5729fdc6d3d9f44c9002303567a992747626a25a2", 0x74, 0x8}], 0x8880, &(0x7f0000000e80)={[{'\x00'}, {'\x00'}, {}, {'\\('}, {'\x00'}], [{@permit_directio}, {@fowner_gt={'fowner>', r7}}, {@subj_role={'subj_role', 0x3d, '\xba(!'}}, {@dont_appraise}, {@fowner_gt={'fowner>', r7}}, {@context={'context', 0x3d, 'user_u'}}]}) sendfile(0xffffffffffffffff, r8, 0xfffffffffffffffd, 0x9) ioctl$BLKTRACETEARDOWN(r4, 0x1276, 0x0) [ 212.222657] tmpfs: Bad value for 'uid' [ 212.232746] loop7: detected capacity change from 0 to 264192 [ 212.248379] tmpfs: Bad value for 'uid' [ 212.269585] loop7: detected capacity change from 0 to 264192 [ 212.299315] syz-executor.5 (4242) used greatest stack depth: 23792 bytes left 20:19:52 executing program 7: bind$bt_sco(0xffffffffffffffff, &(0x7f00000000c0)={0x1f, @none}, 0x8) r0 = epoll_create(0x3) r1 = socket$nl_netfilter(0x10, 0x3, 0xc) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)={0x20002006}) r2 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r2, 0x1, r0, &(0x7f0000000040)) sendmsg$IPCTNL_MSG_CT_GET_STATS_CPU(r1, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x14, 0x4, 0x1, 0x801, 0x0, 0x0, {0x1, 0x0, 0x9}, ["", "", "", "", "", "", ""]}, 0x14}, 0x1, 0x0, 0x0, 0x20008004}, 0x14) epoll_ctl$EPOLL_CTL_MOD(r2, 0x3, r0, &(0x7f0000000080)={0x11}) 20:19:52 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) [ 212.424237] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 212.425370] sr 1:0:0:0: [sr0] tag#0 Sense Key : Illegal Request [current] [ 212.425955] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Invalid command operation code [ 212.426543] sr 1:0:0:0: [sr0] tag#0 CDB: Write(10) 2a 00 00 00 00 00 00 00 40 00 [ 212.427094] critical target error, dev sr0, sector 0 op 0x1:(WRITE) flags 0x20c800 phys_seg 33 prio class 2 20:19:52 executing program 2: r0 = syz_io_uring_setup(0x137, &(0x7f00000003c0), &(0x7f0000ff7000/0x9000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440)=0x0, &(0x7f0000000380)=0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000000)=@IORING_OP_ASYNC_CANCEL={0xe, 0x2}, 0x0) syz_io_uring_submit(r1, r2, &(0x7f0000000180)=@IORING_OP_SENDMSG={0x9, 0x3, 0x0, 0xffffffffffffffff, 0x0, &(0x7f0000000340)={&(0x7f0000000040)=@rc, 0x80, 0x0}}, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_uring_enter(r0, 0x100001, 0x0, 0x0, 0x0, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") write(r3, &(0x7f0000000480)="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", 0x1000) [ 212.473532] audit: type=1400 audit(1656879592.944:13): avc: denied { block_suspend } for pid=4270 comm="syz-executor.7" capability=36 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=capability2 permissive=1 [ 212.604063] 9pnet_fd: p9_fd_create_tcp (4240): problem connecting socket to 127.0.0.1 20:19:53 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)=0x4000) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r1, &(0x7f0000000080)="01", 0x41030) r2 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x6200, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_DISABLE(r3, 0x2401, 0x80000001) connect$inet6(r2, &(0x7f0000000040)={0xa, 0x4e24, 0x2, @private2={0xfc, 0x2, '\x00', 0x1}, 0x3ff}, 0x1c) [ 212.761415] SELinux: unrecognized netlink message: protocol=9 nlmsg_type=0 sclass=netlink_audit_socket pid=4235 comm=syz-executor.0 20:19:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x80, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000500)=ANY=[@ANYBLOB="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"], 0x109) fsopen(0x0, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) gettid() setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x0, &(0x7f0000000000)=0x809, 0x4) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0xfffc, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r2, 0xc0189372, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r0, {0x7fffffff}}, './file0\x00'}) r5 = syz_open_procfs(0x0, &(0x7f0000000340)='net/ip6_mr_cache\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) fsconfig$FSCONFIG_SET_PATH(r4, 0x3, &(0x7f0000000240)='\x00', &(0x7f0000000300)='./file0\x00', r5) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") dup(r3) epoll_pwait2(0xffffffffffffffff, &(0x7f0000000100)=[{}, {}, {}, {}, {}, {}, {}], 0x7, &(0x7f0000000040)={0x77359400}, &(0x7f0000000180)={[0x1]}, 0x8) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) [ 213.291200] blktrace: Concurrent blktraces are not allowed on sg0 20:19:53 executing program 0: ioctl$sock_SIOCGIFINDEX_802154(0xffffffffffffffff, 0x8933, &(0x7f0000000140)={'wpan4\x00'}) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") setsockopt$inet6_udp_encap(r1, 0x11, 0x64, &(0x7f0000000180)=0x4, 0x4) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") sendmsg$NL802154_CMD_SET_MAX_FRAME_RETRIES(0xffffffffffffffff, &(0x7f0000000200)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x4000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000240)=ANY=[@ANYRESOCT, @ANYRESHEX=r0, @ANYRESHEX=r2, @ANYRES32=r2, @ANYRESHEX=r0, @ANYRES64, @ANYBLOB="749f4ef51620ec1c0e88a92c20f6e0d2bf4119253575cc32b4fd159a47ba384498d7e21844f1a4ce19af7efdacc5564494a7828d81420d23ac510ef974e757f17d47835b4dd460bba1bc0f7ef6e70cc74051e23a7548be02a1a80448d6a12adcfbf025c751353f65d5cc594a340c975c2cdbe0084e06b3d4d87db0df7024c05ab0d996e4ad605416ce9b67d03e484c79067969ac4e814d1a884b61c1049e299f60fa5e7768bcf815c7d4473470adf807805a4c095ce5d84ea01be2aabd7da8f6b853bd2c8e3a7a788cb54a60652fd8d14b81ab56aa8a805b24c6a8dd5c4ebe0a2ce0d922e1c081c565f0520887d6", @ANYRES16=r0], 0x34}, 0x1, 0x0, 0x0, 0x40}, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_QUEUE(0xffffffffffffffff, 0x80045300, &(0x7f0000000080)={0x0, 0x0, 0x0, 'queue0\x00'}) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(0xffffffffffffffff, 0x40089413, &(0x7f0000000000)=0x8) ioctl$SCSI_IOCTL_START_UNIT(0xffffffffffffffff, 0x5) [ 213.373198] syz-executor.5 (4269) used greatest stack depth: 23760 bytes left [ 213.719201] audit: type=1400 audit(1656879594.189:14): avc: denied { read } for pid=4280 comm="syz-executor.7" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 216.475622] Bluetooth: hci7: command 0x0406 tx timeout [ 216.475661] Bluetooth: hci0: command 0x0406 tx timeout [ 216.477427] Bluetooth: hci2: command 0x0406 tx timeout [ 216.478228] Bluetooth: hci3: command 0x0406 tx timeout [ 216.478977] Bluetooth: hci1: command 0x0406 tx timeout [ 216.479699] Bluetooth: hci4: command 0x0406 tx timeout [ 216.480393] Bluetooth: hci5: command 0x0406 tx timeout [ 216.481122] Bluetooth: hci6: command 0x0406 tx timeout 20:20:08 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:20:08 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r2, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r4, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r5, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r2}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r3}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r5}}]}}) sendfile(r1, r2, 0x0, 0x0) 20:20:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8000}, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f00000000c0)=0x0) rt_sigqueueinfo(r1, 0x1b, &(0x7f00000003c0)={0xc, 0x0, 0x4}) write(r0, &(0x7f0000000080)="01", 0x41030) 20:20:08 executing program 6: r0 = syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) fcntl$setlease(r0, 0x402, 0x3) close_range(r0, 0xffffffffffffffff, 0x2) ioctl$CDROMREADMODE1(0xffffffffffffffff, 0x530d, &(0x7f0000000bc0)={0x7f, 0x6, 0x81, 0x5, 0xff, 0x42}) readv(r0, &(0x7f0000000440)=[{&(0x7f0000000000)=""/250, 0xfa}, {&(0x7f0000000100)=""/99, 0x63}, {&(0x7f0000000180)=""/188, 0xbc}, {&(0x7f00000004c0)=""/241, 0xe9}, {&(0x7f0000001640)=""/4096, 0x1016}, {0xfffffffffffffffc}, {&(0x7f0000000340)=""/19, 0x13}, {&(0x7f0000000380)=""/149, 0x95}], 0x8) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) ioctl$CDROM_SELECT_SPEED(r1, 0x5322, 0x8f36) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_DEV_INFO(r0, 0xd000941e, &(0x7f0000002640)={0x0, "df7e556de7a003ca73d378b527aa337b"}) ioctl$BTRFS_IOC_DEV_INFO(r2, 0xd000941e, &(0x7f0000003640)={r3, "daad43eb6b96782963b52b51d5c9d628"}) sendmsg$DEVLINK_CMD_PORT_SET(r1, &(0x7f0000000300)={&(0x7f0000000280)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000002c0)={&(0x7f00000005c0)={0xa0, 0x0, 0x100, 0x70bd29, 0x25dfdbfb, {}, [{{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x3}}, {0x6, 0x4, 0x2}}, {{@pci={{0x8}, {0x11}}, {0x8}}, {0x6, 0x4, 0x3}}, {{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, {0x8, 0x3, 0x2}}, {0x6, 0x4, 0x2}}]}, 0xa0}, 0x1, 0x0, 0x0, 0x10}, 0x821) 20:20:08 executing program 2: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, 0xffffffffffffffff, 0xa015000) r1 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) mmap(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x11, r1, 0xa015000) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) io_uring_register$IORING_REGISTER_FILES_UPDATE(0xffffffffffffffff, 0x11, 0x0, 0x0) write$binfmt_aout(r2, &(0x7f0000001180)=ANY=[], 0x220) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x1}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xb, 0x7}, 0x15182, 0x7}, 0x0, 0xffffffffffffffff, r3, 0x0) openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000140)=[{&(0x7f00000000c0)="05ff232ef592436bf2d97a", 0xb}, {&(0x7f0000000100)="9f", 0x1}, {&(0x7f00000002c0)='^', 0x1}], 0x3, 0x0, 0x0, 0x0) ioctl$FAT_IOCTL_GET_ATTRIBUTES(0xffffffffffffffff, 0x80047210, &(0x7f00000001c0)) sendfile(r2, r0, 0x0, 0xfffffdef) 20:20:08 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0xfc, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x9, &(0x7f0000000140)=0x0) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000380), 0x800, 0x0) openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x10000, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @local, 0x2}, 0x1c) pwritev(r3, &(0x7f00000006c0)=[{&(0x7f0000000200)="3d3fbdcfa6be8ea18eed8f40e115df5c6676c873d662ae1ab0f98c7ec352ba42d7b8500f13660e75e769a147f4de4c81ef0db71f7c73f671f7a67e554f442f4be342ef529e69b27232", 0x49}, {&(0x7f0000000300)="c2009a1d8609287d531337e26214653980d8a843784e5cbda0a9fdee4ae2d502fe01fa5c38647744a069a2db75eabc04b8f254b783ef38e704868fc07ecde8f0e217163ae67e7127cfa6ecd7316d553a379a7d01ab0308a73786f2b7f3c5", 0x5e}, {&(0x7f00000003c0)="68e199138080cc30f4bf40c1ef64326b08c3f9fe5e4da6ce43eb113107349b21f3a81119ae376bf5cb769f9ec194e76431e122ad34632ebcd31c0a147691aef2b11b477b17e9ea45993c5376fe7f46a0e222a35c223df6763ffe", 0x5a}, {&(0x7f0000000440)="4fa53a97d454335153702c004f99601520bce3a8506385e94d65c02c53a42e988d529b09e6c50ecf985ff2991886285f7ace3f0266247fde0fc4cdc3a04b02df4ecadd0d93bf6739df9f2f58e23d9a8ded92e392701732145717", 0x5a}, {&(0x7f00000004c0)="f7cdb7d10a41e1e39317443fd2f43a6e99ba22064a9d4ba3588101bbf282c7e2baa7580df360a7f80200aaa1805a52bac703ec252bf87c221ecb8515687863c05e9f1d72e52c8e5d33434c8e3ab7e43351a8a4731d2e16ee4d88a4b293590e2c759dd2310343f20df6c5ee98f3fac0310f4406800319ff40a01784a1acefa73e6bd0645efcf546c37c166d62801d9e80b29137d964ff10537100000000000000", 0xa0}, {&(0x7f00000007c0)="78349b8294d1a3b6c6711538b8ca77c92beeb689deae79e621c6538ded53e5c18e828b350bf320c939ad00d736202d99bd8774efdb87469187ffbcaef3c30c6c8a0eaa6af3123dff75ad48a50b2000c9883cd1fc56d0ff2508865dbdfa702b29cdcea8c3eed78efb872d791a4751f15a36945cfb24bb4b67d9969959af0c139ac021fec6f089c7d925c611420b4f27801042c6f7", 0x94}], 0x6, 0x101, 0x3d0) io_submit(r0, 0x1, &(0x7f00000005c0)=[&(0x7f00000002c0)={0x0, 0x0, 0x0, 0x0, 0x0, r1, &(0x7f00000001c0)=')', 0x1}]) clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 20:20:08 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) getresuid(&(0x7f0000000000), &(0x7f0000000040)=0x0, &(0x7f0000000080)) r2 = gettid() capset(&(0x7f0000000700)={0x20080522, r2}, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f00000000c0)=[{&(0x7f00000001c0)=ANY=[@ANYBLOB="140000003e00010100ffff000000000004000080"], 0x14}, {&(0x7f00000014c0)={0x1670, 0x12, 0x0, 0x70bd26, 0x25dfdbff, "", [@nested={0xfc, 0x36, 0x0, 0x1, [@generic="17f8c5a8aeb7f957d3f4573cf9263741722dd39d1375f03f9f2bfd7ffbe738472df7bfe2250dee4694652e087cd98887c05313425cbd3835119cc91bac5ae0234dfa17ae28e80429e28e6b85365462fdda9e8625e024197d2b6c7aed1ecc7c298a4a07db01d614c92fd2b4b3618196ec47ce061d8b8da0c4fd038b62b2f0be140cb4148760ff8b54d69ec00d12668671ce12827769ea787e814d71224b4f55dbe5cd5a53ea4badc024cec89f068488745158b247962a67743b64b07e32a74b38c7789a3f642496aa32e728fd3a942af1b1241562ec99e279f885e948195eb3da8be8af3c043674ea7ccc8f84703afd08082613b7", @typed={0x4, 0x27}]}, @nested={0xc3, 0x35, 0x0, 0x1, [@generic="c5de609d98feaf59231deaa0e94264ad406078b67207e9b4bac08db72adaa8d3539f4ff5a56aa4ac505ad1d7fd", @typed={0x8, 0x58, 0x0, 0x0, @uid=r1}, @generic="77f01275852af1a7e5d7232f20493bdf5c6c9ada9778beb0e88840bac9fc580c8378fb48a09e982e8ced5d711e8b4f7432935effb283", @generic="23bc2949873355bc87cd9694b48c43d44846caee7cb645185ff1b8c57edbb85358899b498de79f244cd0cad190f99dec3a3888ae959957625e788019b9c913b605541f5326dc5cb2aad6d1193d1ef906d841231c"]}, @nested={0x1004, 0x5a, 0x0, 0x1, [@generic="bb1f2f26bd675922052c2132777e00b4885a23d470e5551399e57811fd69e9a5d8e34d6f1a04ec0f87b251ba229eb463074ca456eff42307a43b5a5eccd85a3e2a6779ae6b1da437341edc29afc1d36e75269defcf828ba44466007892f2e61d9ed9d78093d72a9241703e7be9258463fed11f096c484f6eac62331a12aac143953a7a7f886a19d67fb106dee04822dfd7ea9fa0e9a603c47a271fefe001a0cddcc48485ce5c79ac0c63adb24e3b6b51328b5d374bf353cde8168a1d72cf6bab1296347084d9dfd791fb04429d60659c20a1b0cff601842c5326e6e4ba4155143c355e5466e9da330a78de206a1adc8053b13032506ae3e47fc390c7195bb88d06d5cf5fb7e6cc57416a55fed7f40c920f69df54f485075fa78ea1728a2ac597dff0ce5f38216488bae41d3f8a98a94dc96e8d8057430127a3b1a302df3800a0fdeac59cdcd93c3d655715e5467c155f749f51f57afaa115723126e54fc37928624c09687786d1c72ed0d1338b064e8957ec1022710660acfd307110a8ae04e50196d0ce628f653a0f95a498c7530b3af907416333422ba68daa8bafb133e772d47c55434d3a01d49c7761d796b5b440b3c31f1ae45a6bd9f670540e8e0382441a68034e4ac0787dbf8ffc6141a2efb5e6f2f2a10b5f71579641e48d82582961f52c2529ca3fa222c481b3d3422b60e163b068f2b3659b5dbd6ecd01dc936363b4a96eb800e6fe9770c398d90de44934434bee2f5070ac4b32f9bdae87733d9979af8e2c25bf579859457adcaa13d85a3136522cd8b93b1d52ce9b2394aaeccf2a26213856295c3e469cb87c4302555df1db533a46e9cb52b77d61ae9eee41d07fa4c50f5dd41ca74193649e635077018386217a4ecd9a6aada6e2ce9d74ab276ca45c2b275d16e75f4eeb94ae5d120b31a5edc0c285960a7569f37170229135a172b6ac80d77a5fc56ad33a7185a15d99716b25c6d8de453b9deff3c97dd2521a8b43b2f20fecad4a35eb3e331367801639716f96992f24dff2aa0f0c03e585ef60717a0b2435f1089c1fc4d5a537004c94cc0ecfce041c49e47194d5e3f93ca5e836364e2c12a8c16b211b3c48e595ef11e1b9ab53b4e7aefbe10ba9798f5cca78bc72082f473d46373b5b0fec105d3b2a7e852da9ebaabe3f2a351e00271490908ab916b2ec459630ee063d702a3f805b5871a3390ddc02d764d1d8fc905b33c13a0b2112400dbd0d7b39a2ab80513a5ff9ba956533c435e306efc829e857f251e6599cb256554fcae56c6646c27595fa24b46e2985b9990250caccaffe0ff5f741ca99ffc2fc628a4f3aed858206d5f36831a622ecec91ec4f23fdeaad04aaa2dae3ab97a00c160cd17bfa1706293f2baeb4b952bce9ddbc4694ed38f86817e608d3fefcd33fb9838a7262173edf8d31c4a4bd36cbc39b934cd1f7bd180c7ca2d81a49d1a3a194aabb07498924ad00c5031b91ba0608181679b01fbf8cfffdf2602b7a24d17377aa5c23ad982e764ebd19c7d27a87dd7f2ac4beb3384e058a615348c4cfcbaf2c72136d617ee18bc5f8823e1fb210aab46332cb9aa1d4dee9ef135958a1d17e9f9bb072b52231d3a722f18b7bce5d73077abb03acdf45f900c88b1e79ecfd8c09b0c0b002a084198e457ebe12d7d0a823ebee7a175315ed9bb6327bddcb68cb56527f94cd220defea493288b365527979c338ee282f5602aa9a02c505c3ca2e80f58ab37375ec318acb1d28b146024db2f8db6ef0a63f73ce9b57d512cf3a1b38c850f5f1ff432a0d04a6cb59950648a9adf4fa94f34de05143dd457b3795902d6ecebd56991bb17ee8c89ef22716de3e849e84851bdc3f384378f52b7e67513d0354adc3873fa3396f62f6c4aa48b06621b96926931e1ed6bf3724ec076b907a9fef9963eb399b9a56702316c8ec15939d06e8505abb8773fb2fd06a315bd215d57f6f148037c3f0caa8bfad0c897f7980a65aeb457efc4c6494f9bbc20ba4aa43d6cbf0bc3d80247e4db9c76496bccc33e6deb029b514a919fe9571ff1c66d912f12cea41929648f428d5b4eba76aa2ba2357915d7d41b12555549af3720f86f5fcda99a8809061a454972a3887001286e453dc5bccde827125b9da079b5118986542b5b31cd56df34fc5fe9789d41e88921da4ef0f39214fce40cb1c9169d3f8e8e28017f923d3b97484686824267c7c91cba7049dc55458cc743693332ceb0f00999c8c451b6be6f83248e767440d839741e5bcef5689424360f398e90234f0931b816572ab4f9b63f55bb7ca0624c671e6567cf7b63e7371b9f4b96980c04fa550727508bb4c7717c08a713a73e88f869f2ea18035b650f523e37e80002ad6a354f21abbcdb9652c667442a08bcf6f018a033fc2c7e277c712899314c32edfa0475d92b47a0d2b571d4881a9d1ca0bde8bcdbf207c855c4e807786694705532cd979c2312563a2b0d022f8677a8a42f9a9badea28059edc2ce8428c591b0d237e6f460745a23012f3890aab0bf3c06127c95cba0b78ca06e2d916662df269d1d603fb2dffa8354d781a51d950b2d0be61111d619a4bdd67f79473296a51c072f05419335289071807dba38e0e625c67ef03fdbff14b6c2bc0a028303a00d5e78894129e6fd5a300d9cf5f9e192b029eb280fce45c4ee2de1df2df047f875f283c87f712d759f061264e00b98a8055ed42a6c4eb440ffc56c433ef2c377773d3d49266d44b9a41847bacd2c2fe622e33fcae71039928cf189186edfd31a2bbe0865753dda5c1e529bdeda75a8a86035c7f1a2191928763cfcc24fa354bea74a7af20b048211462e1bfb8c0106e3c8acad181ff8bf7d8af89c6b932d9d12bd600de965f75fc6ffa7a689321be491c496b1e810a9751e732197a037ad1189d12d32fdbe2861e8acb476231838d1059a4af5aebdbdf4911fd8a87275182d1c002ae680ba92677a48126daab2cf32a92b005a0c600d72b899b52b5b855689f87e8b0833a35bb16d070688bba28b5721289f7b1d795063084d2970d8b88763b48b990b6b3f08f1187e63b149475217c47407be2bcd1d3781ce6b7b48f7143883b805f771b7b1691f27f7f7b42aa637d1fb0f7e220516c3cdfbe7793a53b72f63d6b6ffc02f5abc882ef0e6e5cf39e5f7e09ca45fe16cf319cf8f0b909844f668f705853a66aad4659f8efc873389173d4e2de9a8938b3939623b52ff790d0130b96c00a032dac578e2b65f10ae33b96c81beea112827be423ec7b92f1c47de127165de0e7ac5238249ca3fdf22e07fdc94afb9ffbcdfa4e744fa34eea98180d758c6236f71eee35834d0a9ca6bdd92b75ff9d3a05f5d13c0670ae0f2d27860e37b63e74e6dd56895bac9edbc063515c6fe90089eff44133d0e75331921056b7ebf46ffbbd0584be75c25ab16f64e9290bf72aa1d4159adafeefdddf87cdef733cba40cffbe0345c7f34fe93580d7fa5d4a36f5374db6c61fe1e402f9382e46442f7498c04cec141efe09846e343449e08cc2de0e8f751eaab50fd014d517315bea646524d10ee29320e1f3eb9b30edfbc7cc30f1881bebd42b0cd13b79f7018e7a8b771016d745de51aaf51f2ca9f32313f936e8b06b6d526a6ccecef0814ee42a8a24604e0384dc94d9a594a5c5ef3f473956812793ee9abf468c8e83779f26260fa2c5043ff1ea1660f6c1efaf64488305de4367316c6d50d13c3df808f04f176de33897bf2312670e94130db60a257a2c4bf7f7e3f4dcb7516a256a18bfe7f4318dc6c6602cbff184994b51f30a05c8b4f5bd78c5e96ac00497212e236b92baa5f265afa8d3f6c25ca790c8af87233426b16d0d31bbdf7d1eaa6f8b0ad079e9536a9992fe24cd266a9fa5858f4f6fe4ab921110aff461486ee23df597e8d579982d1e17818d9d0e67591766eddba662a98f32410890b0ff9b2aea00d3b4a500bf3de7a3f13b12cc22c1fbe2b0c8fd9df9ae7d26d9a540c6cae448d75c0ccad912ba66426cf49b4251519e07d6792e81cfe905cc421c546c9f6a3ed89b2ee744cc73bd2bfcf98d28bccdc0189ab4ed5410b835503e785325686070cef0e01eb484a5111e2da94e23b0e2ea70b175710e027f0b60560162da203eb15aecc97b8a593bc5bd1b663da7f7318c05e9f45396ad304aa66a4871ba257343cdd1ca62ccec2467ac5b1d1e3b69cf03fec1daca8c8d4651c2c2693b01a34e7908289303861b741e4376c675a86bdbb1a4a0d1cf0af1f169dda63b32435a83c1aaf00d0fb5e466636a5c975086f384d88b8828a84724b56f77c4317c9aeb60d6f65d21a74b6fa94e3587d084ffe8d0abc2fb31fedcf6f78a9e69111cf6ce1cf92a28f5f87236b9fa693af8a34a4a39197d213c998cb8204adb6117aaab126527b639316393e6f4bb14afd53c36608b066ec696f5b375befbd917d0249af9f747b719292f79cb20ce0d961dcafd1b888c19c114f317eb6c567c8b7f14bbf27ed26cbf96a0fc3362ce0fe433953c80b5e376492b10b4e1da6258abb625843486b404a4101b633973358997555fd2b1e662f2321a4e68ab2f8c9818c86eef77a7c70cee11f2386fc6de11e6d5d14a95b65c30134e0e30d1136c0137527dc7129045c96387c50098b8b7ca0a662cb7dca5d5b4b4f6d6c4aaa1df2854c757551e15b3fcf61ae24e398a65184bbbf3d8427b28867e8055cdfcdcb67ff1664ea2aa585cb693741a5147908988c33637869673a1887a97d9a30448caaa5d9c40122c872fb066f6b631b9d637cb69fe2511052acb1592df940c231836c3a560d4d7604a8cda236b97b5f05d61ec142a9c475bf5d9f78016c628274847a8b2d7e395e26460e9258ced06d152afc37027c2650c9186a8e5ed1770e6382f102c399f35a6be8e7fa43070dd289f065f5239dee151f49e4fb892642b1b6ec37402eb7bc83221b553d350ced30ebc4db94267ec1ed162187981601ff5b77b26341248aff288461149f98ed9676b96d0886875f975f89f962ebeb71e7331e25e22137b21522a1f73a77f17c2c2e8114d3a457202c124211374d7c1a770958b4c288187bc9727bc845119810771421b202c46670fb97e5bfdfd87627e0c43b16e30c4f57a910a571e9296894dbd0968b22641ae2234970413b7d80e3ddbe7294efcfde5991171dc212936392b03b5724ebd93295fbda80c0d870b22488eac7afccafe31216b63541f02ed7888fde222b182a056212ecefbe28125be18a6271b2e11db1bd3d4cb3447bfda4981fd64a14ddfe6696fffc0ac2d54169ae3e69b23781d3076d3d8d998acb778e80c304cea7b5a91cce99751bf3a7667c668ba406538d9395622de9ca3ced70f225d5257858b0b68a88430a76cbc5a750a43ba41ceef7c3e8df92dfbaca43b3fda1b58e6666bf678724dd2388c12a5c1ce806df174aa6603b4617a68eb2e0285c9fa1736739d32fd53d1514d84ec979f27b2d884ae1d577ec42e224ac32561854d6216c4fb7c7896f0ac5737df0bd2886c4df85fe89107ed990341494a010ad2bb5d77654c4199b7f1bedb8d9a629faa8c0728df6cf13f24e1cc0a1504c2a0fb26738f1e3603bf0136b7b7df04dd999ac61b8d46adcd0f1ee1684db5feac4877dcf0d27c5fe7970f012cd8ff9649d99e6e55a4169a64f33fba41d04a4c8650c0ad4fd443fd108c47ccbd2fceb3902dce3e10337893922e317461ccfbb1a8600355cc3a0cef28a900fbbc2f6f234cb4c52692438b8796b74407dd2aee35eb618be5e76c5a482e42b51d6f4b2299fb5ccea30637c6aada6ee2f33a"]}, @generic="90a18e293f2eeccdf0d233dc8064b063a5beb1935da7af7bad4559985ecee526788e1e6f553685cd783926c2e1f2e419a4c093f8221e8ff4b742d677ab868bea4b2f360aad23d779f05a27635dbfd8cb792bf203b274c2207388e69812eb7b21b1fd4943ff9938a6349b4a66120149027a32b7408c66c8b47bc8c20efd967423e78425f6f8d40ebd4115ff52c8b68557b5b8d7fbcb5be57da9129eb520c07f13ca710b166457f81d9f77e9dc58d49272083cfc4f3fc70fbd68382184eeb67da5573cf3562a16328452a230c8dd32ce1f1cfbf4553a0004c4d3d08763b7e226fd4624f6e4d9667c21b4079ed71b8901fb6fcb8390d365", @typed={0x48, 0x39, 0x0, 0x0, @binary="dad3522142046c3acb8a8c3f2e6447ac5e4ae1f362186742efcf6fd6ab5774d2c0f816371e691057ffddecc655b943f06a33d0ed5fd17513c6a634d3661c31be34fca7fa"}, @nested={0x170, 0x69, 0x0, 0x1, [@typed={0x8, 0x83, 0x0, 0x0, @uid=0xee01}, @typed={0x14, 0x67, 0x0, 0x0, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x01'}, @generic="8a81f8615718fcd456e60d8c7386976591f6b2bc05fdb861d2ffa11acf1fe170e0e30e8700c2a8c1825f4a53d38840b42c1e243d6413d63c85a03817c06a0c1bf2507808a47cdae9a98dee9ef9cfb8e6985a3252fec845751f172561885044c1e482a023393413ec9f582f7426a9aa10ee78533dd21005f1accf1dac90819453ea3b9049cda636628452ea5d6c49af4a430f80a05fac2b76b8c4fd74fc1fb3550e4ce6b47035e09c97863de78f689d799857d11c0c1962fe1e3e92225f1c9b6403849ecdd6ae17342acb21b1b64528d7d68d181b", @typed={0x8, 0x3, 0x0, 0x0, @fd=r0}, @typed={0x73, 0x5a, 0x0, 0x0, @binary="47d7fbf8e260d9a0e0175d0e47427841c3ea607724bf0e4f601f5b4c5e34396ad00332f2fad72ee6249036fb18c700708d2b57f98919d04cf9b4fb3849ab27a5ba6a10a6ea91315e79b202e8e5bc092b9e026ca72fd1980085875e221db22393e21c0964355011404ab0753410a0f0"}]}, @nested={0x1c3, 0x25, 0x0, 0x1, [@generic="ab38c8e6db7b7432f77629ebf221e5fa7d5f62e7ea43ae224fb9188f61f0de2ca44b055e01a0e842ea45ae4c60aabef0de52eb46934e48b01d1563973cb2b3f2a276ef486476fce7f48882cd60646fb6ae84986dee91d220d1ec328581f674495d62bf5be85d0549f7621fd201e7abb2b1b5f45b66607e795a1189cbf5971f4308c4a9178e0456410ec714c902acce8b1ca622ddec457940e3d0e6cde5f399ec1384e377af42281ea760fd4712b3ee7c5a3b3603df59a8a4f9eb366acf7fe3312fc127fff4ee33664f3c3e779cd3fc6fff242332519f", @generic="551dc4fc771c4ecd6493ce0dd0b60b16774c348ea25cae36b6a68b5c96a8293d1f075c429c14777f61dbe24f96ed96d315170dd948e4dbb71c18acf4627b37dab8f8883545f46e3b328b810c27a8c2f98b3fb8c778b14838bf3d56d70a44651cd3ef3c3bfea48ea8c5ea4679e64d11f593347abd9e3a0436635b72e988b031fbe028dbfdd48a1960be7210c02c63e225c29902a32e87f5ddb04dfbec322aab805ae671bd5e53f562fcf903dc07c02aa4d1ca4dc96a943ef65dd2f5fe42758c22ab5f9b06ea3b3628953f79ae085292a3e2ee255f0852b687788767167c19d635dc8ac969c36a33a532"]}, @typed={0x9, 0x14, 0x0, 0x0, @str='$!$#\x00'}, @generic="06932a4085714763640674b8e0392edcb78d1b1f172a71c4ab69c80d2d"]}, 0x1670}, {&(0x7f0000000200)={0x164, 0x16, 0x400, 0x70bd2a, 0x25dfdbfc, "", [@typed={0x8, 0x7e, 0x0, 0x0, @pid=0xffffffffffffffff}, @typed={0x5c, 0x6e, 0x0, 0x0, @binary="ae5c6beb0c9364422472a7e84b8f169207ffdc2be7a0d89462c32d1201015502cb628e7974e53cff4a36ed5ebba8a724cc1afce3cf0778c3a65d546f4eb39c3e52fbf3815b2b41e30f4f9cd47415f12fa6461c7c4e32474d"}, @generic="40076907007c5c36b5e6a6376cfb2a6914a578bfff76a0eabac0032d0b8028237fd668701cd451af1847d370c51bc6113955ae8bb014761be89a8e79259a745541c148f39657e34a92b00cbbeea70bd0f605550167af6a5fea6ad8094b0c6b235558144857a060cc641ca68cfab63ac77727b9d65e57446869e86b88fa0b3077b8f0deea9f06743c63c9d64f532f8631238847e934b471edc369fa14a2e27faa4a07a19d55628d3ff80476e78b08b03da5968d3dfec89942490acd81094f1188ae1dee499cf1a36601b376b2591ba8d4166d0fa4aa72552c0255ab3f99", @nested={0xf, 0x5c, 0x0, 0x1, [@generic="390445b284fc31483fdcf7"]}]}, 0x164}, {&(0x7f0000000380)={0x13c, 0x13, 0x10, 0x70bd25, 0x25dfdbff, "", [@nested={0x1c, 0x2, 0x0, 0x1, [@typed={0x8, 0x3f, 0x0, 0x0, @u32=0x8}, @typed={0x8, 0x4, 0x0, 0x0, @u32=0x1f}, @typed={0x8, 0x4a, 0x0, 0x0, @pid=r2}]}, @generic="aaa7634e21e94fc869c8f0183a3af69dfb4b1635a2b6efe3fdaa50cee99d015933b199776ac4d6327c762587695d0b4057537149530e6e55b4afeda2d59ca98cc308052e0597a28cec2aaa39766452297dad8fb380fdf0b1a3d8208607549b7916302412f122355d8f44b9d71e90d0628e33359807fe2ae49809768a40554cad7b0ff289a141483c26d7d176b9840f4d5a71e84474a5edb1a5800d8d8e9026045ea9eb04866cb3542c3e4e2696eb78f33868c52b00b39d858a27921df8a996eb1b0457d9aac1d4adef3523b37badcad5449fc7cecc7c306b", @generic="8bc2e39127c8423bbc39ce0f8c79438a039304ec430519cb39a867e4125a5247651a3deb62637e30e522acc0732f296ae37c6d9c76afaeb0"]}, 0x13c}, {&(0x7f0000000740)={0x26c, 0x1a, 0x300, 0x70bd28, 0x25dfdbfc, "", [@nested={0xdd, 0x61, 0x0, 0x1, [@generic="8283abcafc9a82f5f8534147652a2ab9b6179451b7ba25aa915b4f3749eec16543bf838f1b1554b9e55ab75676ea8a24cb3d20b62b8a3c7cb5d9c68be4dcdfc6071adff066726f05b99be641fa1a", @generic="1603cba705f10dc413f1b8ab7d690e0a52de9e7628de6db4eaaaccc939852636558f88e05fbed02c70a64c1e92d0388e758cce89c57df008fd6c5e395c2c8cb741b2bc7510d01457a82e0693a7cba522c69df6f540678f885c0e4ba4a4d6379257d6fb17bda40ac5e2c9d8ae82891e3fc4d1fdbedc3c3c3759810e0c94a52f720dbc29", @typed={0x6, 0x4a, 0x0, 0x0, @str='$\x00'}]}, @typed={0x8, 0x73, 0x0, 0x0, @ipv4=@loopback}, @typed={0x8, 0x8d, 0x0, 0x0, @pid=r2}, @typed={0x8, 0x1b, 0x0, 0x0, @u32=0x400}, @nested={0x81, 0x49, 0x0, 0x1, [@generic="a08024ee9baa958a2de6e90d7c7862397ffe12fe09b4445557cf1e3bbd42a7e48c5d07b2a13d42249625333337516eee5fbb261ff35b7182eb87ddf79fb11b9b6e33f11cb8fd8a550ad4fa179ebed3db8f27cbb68e3af2fe674250b64b4847b1be3dee0289048f361c8020036e267d8bf86e5e8767933dc2aae6d73b7e"]}, @generic="a8e5cd62b316e1013d8e673b43e3a6e6e79d16ea9f72a802802397dd43af6beae359ec79b551a1bbf1e46ac5849b446664cf55522ba4", @generic="864cb87dfd1afd75cda256baaf8a935516418d57ffdfe446513551f36232308da19aa0b7a5fd3e72579bdcec5fe5416a78769585a62ea7aed3b1f28913a89b4724bc0d125f66a2ca118fbc766eb6ed838309cadbb5b8f23f21302e880f949d85661c5acf2d7fc22f88ed2e0f57204f582d11db1293a6fce7be9f2eb732ab73b6b6e31c6a88e1b01f7235a3d6ad1540930e3303d35593de83780735d344cc393dd6214deef0e3e0b111"]}, 0x26c}], 0x5}, 0x0) 20:20:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) write$cgroup_pid(r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 228.103005] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 228.103759] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 228.104255] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 228.105533] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 08 00 [ 228.106118] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 2 prio class 2 [ 228.107194] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.108023] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.108635] buffer_io_error: 6 callbacks suppressed [ 228.108642] Buffer I/O error on dev sr0, logical block 0, async page read [ 228.109685] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.110091] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.110716] Buffer I/O error on dev sr0, logical block 1, async page read [ 228.111359] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.112170] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.112785] Buffer I/O error on dev sr0, logical block 2, async page read [ 228.113421] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.113875] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.114545] Buffer I/O error on dev sr0, logical block 3, async page read [ 228.115202] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.115633] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.116252] Buffer I/O error on dev sr0, logical block 4, async page read [ 228.116872] audit: type=1400 audit(1656879608.587:15): avc: denied { watch_reads } for pid=4330 comm="syz-executor.6" path="/syzkaller-testdir384161087/syzkaller.8UqB7i/7/file0" dev="tmpfs" ino=1 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=dir permissive=1 [ 228.118951] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.119363] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.120003] Buffer I/O error on dev sr0, logical block 5, async page read [ 228.120664] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.121085] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.121727] Buffer I/O error on dev sr0, logical block 6, async page read [ 228.122442] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 228.122910] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 228.123534] Buffer I/O error on dev sr0, logical block 7, async page read 20:20:08 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0x1, 0xed, 0x0, 0x0, 0x1ff, 0xc5000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000200), 0x6}, 0x1, 0x1, 0x6, 0x4, 0x3, 0xe11, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xa, r1, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @dev}, 0xc) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000440), 0x200, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000480)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x4, 0x1f, 0x8, 0x0, 0x1, 0x4b884, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe42, 0x1, @perf_config_ext={0x7ff, 0x4}, 0x2000, 0x9f, 0x2, 0x7, 0x1, 0x3, 0x1ff, 0x0, 0x14, 0x0, 0xff}, 0x0, 0x5, r1, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8885}, 0x8000) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r5, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) writev(r5, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a", 0x27}], 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000001000009180000004238fb79c0ec296fa80b3ea479f4d6629ab323283ce6b32d40ff124fee10", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x4) 20:20:08 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) write$cgroup_pid(r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:08 executing program 1: io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6c89}, 0x100}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) pwritev(r0, &(0x7f0000000300)=[{&(0x7f0000000000)="81", 0x1}, {&(0x7f0000000540)="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", 0x170}, {&(0x7f0000000480)="54382d5afe676e8e8f3481235be46b737a16d1c736b137f405a7cd2ded4d2e57ab4f5514143ad8671395b36535641b7ca232222d5827aff6fd259c8974f7da22e024b7711a9353fdc2f8a0e093674ffbb85cf6d6eccf7230295dbd42fb8e8704c8f52978ad67cc60d0f28e8b3ad7903acb6d8e5f53ca6180ed2aa238a4540cc1e9d3fa5ac351fd05ec46d0bc7e8987518fe47bbca7d36bc590152aa766a2ec93041b37c9cf30656557351251321209ad63726c23ed65f14433944c0d", 0xbc}], 0x3, 0x0, 0x1) socket$unix(0x1, 0x5, 0x0) syz_io_uring_complete(0x0) setsockopt$inet_tcp_TLS_RX(0xffffffffffffffff, 0x6, 0x2, 0x0, 0x0) syz_genetlink_get_family_id$netlbl_calipso(0x0, 0xffffffffffffffff) io_uring_setup(0x50f5, &(0x7f0000000340)={0x0, 0x0, 0x2, 0x0, 0xa07}) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) io_uring_setup(0x7e6f, &(0x7f0000000080)={0x0, 0xf5cf, 0x4, 0x1, 0x20c}) getsockopt$sock_buf(0xffffffffffffffff, 0x1, 0x37, &(0x7f0000000180)=""/241, &(0x7f0000000040)=0xf1) 20:20:08 executing program 6: rename(&(0x7f0000000040)='./file0\x00', &(0x7f00000001c0)='./file1\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$null(0xffffffffffffff9c, 0x0, 0x80800, 0x0) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x2, 0xd3, 0x6, 0x81, 0x0, 0xffffffffffff0000, 0x42d0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x5, 0x2, @perf_config_ext={0x7, 0x66b9}, 0xce, 0xfffffffffffffc00, 0x10001, 0x4, 0x0, 0x7, 0x9, 0x0, 0xffffffc1, 0x0, 0x1}, 0xffffffffffffffff, 0xd, r0, 0x1) fcntl$getownex(r0, 0x10, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) r2 = socket$inet6(0xa, 0x1, 0x0) bind$inet6(r2, &(0x7f00000002c0)={0xa, 0x4e20, 0x0, @empty}, 0x1c) recvfrom(r2, 0x0, 0x0, 0x0, &(0x7f0000000100)=@rxrpc=@in4={0x21, 0x104, 0x2, 0x10, {0x2, 0x4e21, @empty}}, 0x80) pwrite64(r1, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 20:20:08 executing program 3: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil) 20:20:08 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0x1, 0xed, 0x0, 0x0, 0x1ff, 0xc5000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000200), 0x6}, 0x1, 0x1, 0x6, 0x4, 0x3, 0xe11, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xa, r1, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @dev}, 0xc) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000440), 0x200, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000480)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x4, 0x1f, 0x8, 0x0, 0x1, 0x4b884, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe42, 0x1, @perf_config_ext={0x7ff, 0x4}, 0x2000, 0x9f, 0x2, 0x7, 0x1, 0x3, 0x1ff, 0x0, 0x14, 0x0, 0xff}, 0x0, 0x5, r1, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8885}, 0x8000) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r5, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) writev(r5, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a", 0x27}], 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000001000009180000004238fb79c0ec296fa80b3ea479f4d6629ab323283ce6b32d40ff124fee10", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x4) 20:20:09 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) write$cgroup_pid(r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 228.684443] random: crng reseeded on system resumption [ 228.691302] Restarting kernel threads ... done. [ 229.388545] random: crng reseeded on system resumption 20:20:23 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r3, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r4, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r4}}]}}) 20:20:23 executing program 3: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil) 20:20:23 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',caChe=fscache,version=9p2000.u,pap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 20:20:23 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) write$cgroup_pid(r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r4 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r3}, 0x2c, {'wfdno', 0x3d, r4}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:23 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0x1, 0xed, 0x0, 0x0, 0x1ff, 0xc5000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000200), 0x6}, 0x1, 0x1, 0x6, 0x4, 0x3, 0xe11, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xa, r1, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @dev}, 0xc) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000440), 0x200, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000480)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x4, 0x1f, 0x8, 0x0, 0x1, 0x4b884, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe42, 0x1, @perf_config_ext={0x7ff, 0x4}, 0x2000, 0x9f, 0x2, 0x7, 0x1, 0x3, 0x1ff, 0x0, 0x14, 0x0, 0xff}, 0x0, 0x5, r1, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8885}, 0x8000) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r5, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) writev(r5, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a", 0x27}], 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000001000009180000004238fb79c0ec296fa80b3ea479f4d6629ab323283ce6b32d40ff124fee10", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x4) 20:20:23 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:20:23 executing program 7: mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000040)='ramfs\x00', 0xc0ed0000, &(0x7f00000001c0)='exB\x9fR\xa8\xeb\a\x00\x00\x00S\"\x93\xf7\'t4\x00\xba\xc9\xe3\xa2\xb7\xce\x8af\x9aXyE\x8a\xad\x1e/=a\xfaGi\x15\xb2c\xc0\xb8\x99\t\x8d\xe0E\x84\xcb\xd6\x1a\xc3\xbe\xf5\xba\x1f~\x1a\xe1\x06\xa3#\v1\x00.\xbd\xbf\xeb\xd0\xbfs\x1a>\b\xd2\xf4Z\xe3d\xda\xdc\xca\x84\x7fk@D\xb8&;m\x91\xdf\x8b\x7fQ\xa0\xa4\xcd\xda\xdd\x8b\xe4\x8f\x15\n\xdf\xbf\xcb\xaeb\xe2:\xaa\xb9x\x96N\xe7\x89R@D\xca\xe8\xf3\xc9\n!\xda\xb7WO\xba|\x11]I\x1c\x00`j;{\xe2\x90\xe1;\xab\x17wKD\x02\x1a\xfb\x18\xb7j\xe8$\xc3\xd2M=a\x18\xfd\x14\x94r0}, './file0\x00'}) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x8, 0x1, 0xed, 0x0, 0x0, 0x1ff, 0xc5000, 0x2, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1000, 0x4, @perf_bp={&(0x7f0000000200), 0x6}, 0x1, 0x1, 0x6, 0x4, 0x3, 0xe11, 0x8, 0x0, 0x1, 0x0, 0x3}, 0x0, 0xa, r1, 0x8) r2 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$inet_mreqn(0xffffffffffffffff, 0x0, 0x0, &(0x7f0000000080)={@multicast2, @dev}, 0xc) r3 = openat$hpet(0xffffffffffffff9c, &(0x7f0000000440), 0x200, 0x0) ioctl$sock_inet_udp_SIOCINQ(r3, 0x541b, &(0x7f0000000480)) perf_event_open(&(0x7f0000000380)={0x0, 0x80, 0x81, 0x4, 0x1f, 0x8, 0x0, 0x1, 0x4b884, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe42, 0x1, @perf_config_ext={0x7ff, 0x4}, 0x2000, 0x9f, 0x2, 0x7, 0x1, 0x3, 0x1ff, 0x0, 0x14, 0x0, 0xff}, 0x0, 0x5, r1, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) sendmsg$ETHTOOL_MSG_LINKMODES_SET(r4, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000}, 0xc, &(0x7f0000000180)={&(0x7f0000000140)={0x1c, 0x0, 0x400, 0x70bd27, 0x25dfdbff, {}, [@ETHTOOL_A_LINKMODES_AUTONEG={0x5, 0x2, 0x7f}]}, 0x1c}, 0x1, 0x0, 0x0, 0x8885}, 0x8000) r5 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCSETSF2(r5, 0x402c542d, &(0x7f0000000040)={0x0, 0x88b, 0x0, 0x0, 0x0, "425bb45816f822e6b8208f9a07eeec557d2e8f"}) writev(r5, &(0x7f0000000000)=[{&(0x7f0000001140)="11975a43dcd3ad912051513fc9654ddeea5893b8cfbba61a2ce44acba1e61e63a4ccb378062a1a", 0x27}], 0x1) ioctl$AUTOFS_DEV_IOCTL_ASKUMOUNT(r4, 0xc018937d, &(0x7f00000004c0)=ANY=[@ANYBLOB="0100000001000009180000004238fb79c0ec296fa80b3ea479f4d6629ab323283ce6b32d40ff124fee10", @ANYRES32=r2, @ANYBLOB='\b\x00\x00\x00\x00\x00\x00\x00./file0\x00']) ioctl$PERF_EVENT_IOC_DISABLE(r6, 0x2401, 0x4) 20:20:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) write$cgroup_pid(r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 243.593816] random: crng reseeded on system resumption [ 243.622268] Restarting kernel threads ... done. [ 243.658675] 9pnet_fd: Insufficient options for proto=fd [ 243.890243] syz-executor.5 (4400) used greatest stack depth: 23144 bytes left 20:20:24 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r3, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r4, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r4}}]}}) 20:20:24 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x12, 0xffffffffffffffff, 0x10001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3, 0xa0, 0xaa, 0x7f, 0x0, 0x5243, 0x80060, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040)}, 0x18008, 0x5, 0x80, 0x5, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x8001}, r2, 0x8, 0xffffffffffffffff, 0x3) io_setup(0xd29, &(0x7f0000000780)=0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x170d, 0x5, &(0x7f0000000700)=[{&(0x7f00000003c0)="4c865fbf3de00e87943a47ed97e2f969ef7761c5705f7233e2cd3f9c6ddcf720f08dc2df4afba620341199187a7b05a3d43f66eade1507c75d8e8ebc12b0a39e74e57145ebd1aaa72a3e5575e74f8f2dcb0bfbfe091bbc10f74dcb31f487d3b08acf132eccdc479fc8bada2be1b89b2a68a89be8f8d7f40f45f309b1f05f9ef2b68e20bfad34eaf1f164678980840089187b195045187486", 0x98, 0x20}, {&(0x7f0000000480)="33beee5101cae0ef2daa1c956389f183ceec87cf76cb4cd9a145", 0x1a, 0x8}, {&(0x7f00000004c0)="53fcde86c7101e76199c6cfa90a51704f10c0f878f24e8a40f156b0ab5c12c2bab73667a8b56a44c6c3fe61cf070da179faed1c0b876fb4b96339794f0e1bc1de6302b1a71ad0449cbb3e9f6bdcc39bd9001f593189ca6634e30f10259c56de23caf9eca283871a43432448280c9dfb3f671903f56fb33f4d2a28f7c3c6dbd7902ca10b60c863a020cb923acc9119a5f4fd7d4620e7d3b4b2bf650b4c2d4f9a06b37dec107de33e584b3592835d61cc35fada84d607acd663003f178e928d25ae8bc72adb2f52dd755e6f5bfa3", 0xcd}, {&(0x7f0000000680)="b00ba1acda123e97e0a8b541d8dc196d33958e0213b30507bc6f5bb8008d1fdfec88d6f51a07dd30497b8a3f71e8937ba5a234946b6be51d76fdeba71d2f976307c971ce82a646e4b2a633654b23359799b5ddab42307becfb4b2748b78c1b47e230557410b789ed918e6746efaf", 0x6e, 0x100000000}, {&(0x7f00000007c0)="1ec5ac92f31d016ff3b060a46b0dd9ce2ecc51fae6b23bcad525bb28c239bdef62566ca39bed47438358600364b09e9da59d526a23127fa2bf72086998be04efc9dc2f15085dcd2d5891b1bf41502fc43e451598f91f8cb7e2eaa2b88339c2d84a1eb24c5a65dc9651f5e9ac7282f28f51482563dea2aaa94e6d958b677eab7ff71cbd683844c7d27a740f83bc946897985d18a33e4a86875715da4af621c162cdc5acb3b13fe2f8d57d2be35a33073bd9b8463f6fe7cd69677fb542b120fbbf795ab123262769c0888aea953d465bca84102d8c0c67ca6381", 0xd9, 0x20}], 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRESHEX=0xee00, @ANYBLOB="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", @ANYRESHEX, @ANYBLOB="fd7443bcc13cdf749e13dafe", @ANYRESHEX, @ANYBLOB=',huge=always,fsmagic=0x0000000000000005,smackfstransmute=\\{,,permit_directio,appraise,smackfstransmute=,\x00']) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f00000019c0)={0x2, 0x80, 0x1, 0xff, 0xe8, 0x3, 0x0, 0x2c3ec332, 0x92398, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xcde, 0x2, @perf_config_ext={0x9, 0x101}, 0x200, 0xfffffffffffffff9, 0x6db, 0x0, 0xffffffff, 0x1, 0x2, 0x0, 0x2, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xa) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f00000009c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000300)={0x42, 0x30, [0x8, 0x2, 0xa1e, 0x7f], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r6, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) io_submit(r3, 0x3, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000000)="1c", 0x1}, 0x0, 0x0]) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xff, 0x1, 0x7f, 0x1f, 0x0, 0x7fffffff, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp, 0x400, 0x7fff, 0x2, 0x0, 0x0, 0x2, 0xbb06, 0x0, 0x6, 0x0, 0x100}, 0xffffffffffffffff, 0xa, r6, 0x8) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 20:20:24 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',caChe=fscache,version=9p2000.u,pap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 20:20:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) write$cgroup_pid(r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:24 executing program 3: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000fed000/0x13000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x80000001}, 0x0, 0x7ff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffa000/0x4000)=nil, 0x4000, 0x0, 0x10, 0xffffffffffffffff, 0x4) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/route\x00') sendmsg$SOCK_DESTROY(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x10}, 0xc, &(0x7f0000000180)={&(0x7f0000000480)=ANY=[@ANYBLOB="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"], 0x130}, 0x1, 0x0, 0x0, 0x4}, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = openat2(r0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x200, 0x21, 0x1b}, 0x18) ioctl$LOOP_CTL_ADD(r2, 0x4c80, 0xb) r3 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r3) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r3) r4 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000440), 0x20001, 0x0) ioctl$SNAPSHOT_FREE(r4, 0x3305) mremap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) mremap(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x2000, 0x3, &(0x7f0000ffa000/0x2000)=nil) shmget$private(0x0, 0x2000, 0x54000000, &(0x7f0000ff5000/0x2000)=nil) [ 244.003418] hugetlbfs: Bad value '"' for mount option 'size' [ 244.003418] 20:20:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x0, 0x3ea8, 0x101, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000180)={[{@size={'size', 0x3d, [0x22]}}]}) 20:20:24 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 244.046631] 9pnet_fd: Insufficient options for proto=fd [ 244.053051] hugetlbfs: Bad value '"' for mount option 'size' [ 244.053051] 20:20:24 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$inet_udp(0x2, 0x2, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) bind$packet(0xffffffffffffffff, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_config_ext={0x0, 0xfffffffffffffff8}, 0x0, 0x3ea8, 0x101, 0x4, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0, 0x20, &(0x7f0000000180)={[{@size={'size', 0x3d, [0x22]}}]}) 20:20:24 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r2 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r1, 0x2, r2) write$cgroup_pid(r0, &(0x7f00000000c0)=0xffffffffffffffff, 0x12) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 244.205716] hugetlbfs: Bad value '"' for mount option 'size' [ 244.205716] 20:20:24 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r2, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r3, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) [ 244.235126] 9pnet_fd: Insufficient options for proto=fd [ 244.245952] random: crng reseeded on system resumption [ 244.293433] Restarting kernel threads ... done. 20:20:24 executing program 7: ioctl$sock_SIOCGSKNS(0xffffffffffffffff, 0x894c, &(0x7f0000000140)=0xfffffff9) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x94b, 0xe, &(0x7f0000000200)=[{&(0x7f0000010000)="eb58906d6b01010000617400020820000400008000f80000200040000300000000008000000000000000000002000000010006000000000000000000000000d2800029e314a5f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461623e65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0}, {&(0x7f0000010100)="00000000000000000000000000000000000000000000000000000000000055aa5252614100"/64, 0x40, 0x1e0}, {&(0x7f0000010200)="00000000727241610300000009000000000000000000000000000000000055aa", 0x20, 0x3e0}, {&(0x7f0000010300)="eb58906d6b66732e66617400020820000400008000f8000020004000030000000000000001000000000000000200000001000600000000000000000000000000800029e314a5f153595a4b414c4c4552202046415433322020200e1fbe777cac22c0740b56b40ebb0700cd105eebf032e4cd16cd19ebfe54686973206973206e6f74206120626f6f7461626c65206469736b2e2020506c6561736520696e73657274206120626f6f7461626c6520666c6f70707920616e640d0a707265737320616e79206b657920746f2074727920616761696e202e2e2e200d0a0000000000", 0xe0, 0xc00}, {&(0x7f0000010400)="00000000000000000000000000000000000000000000000000000000000055aa", 0x20, 0xde0}, {&(0x7f0000010500)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4000}, {&(0x7f0000010600)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4200}, {&(0x7f0000010700)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f00"/64, 0x40, 0x4400}, {&(0x7f0000000040)="f8ffff0fffffff0ff8ffff0fffffff0fffffff0fffffff0f0700000008000000ffffff0fffffff0f0000000000000000000000000000a40c0000000000000000c45832492547322c41908c905bbf28fed8769702aa3aa54a68e490d22647ac1033b3eb37f9959411a9fd8709cc7bf65bd25bcb57f929adf1509320be747247af0e63bfcdc17333144d29f356d2c7699f8b61e9a748e5398a3305dc64083203", 0x9f, 0x4600}, {&(0x7f0000010900)="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", 0x120, 0x4800}, {&(0x7f0000010b00)="2e20202020202020202020100089eb70325132510000eb7032510300000000002e2e202020202020202020100089eb70325132510000eb70325100000000000041660069006c00650030000f00fc0000ffffffffffffffffffff0000ffffffff46494c4530202020202020200089eb70325132510000eb70325104001a040000", 0x80, 0x5800}, {&(0x7f0000010c00)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x6800}, {&(0x7f0000011100)='syzkallers\x00'/32, 0x20, 0x7800}, {&(0x7f0000011200)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallers\x00'/128, 0x80, 0xb800}], 0x0, &(0x7f0000000380)=ANY=[@ANYBLOB="406434c323d6c76c75606be8562698f48b3f2b58fdf31d8db90a91c666b01b8cb36bc57059ad37eede0868893353a5bbf167224048de2a064b5a163569b9a02c5af43ca9efde02250e576f1570355a2305ae5284ec74db393514916e24b4b179ea36e2697057902a68df56799e0127f9324e07b33d1ddc4124cb35b4c5c2d63b0433c65e9b4081d77a90662ce573f0bcda8c56f710623697b6fd59879566c0fd1f975b3633b6371739bebd3f3dc46d6b7a2aee9cfb9a06be09bf675092418365dff552b13235f65d06f5d749d8ade300b519df11b211870c239571f3d5bf6ac1599cb5401ded3d3058dd7e71df53ddb85a48eca003ffb5dbee4576f642"]) 20:20:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 244.357556] syz-executor.6 (4429) used greatest stack depth: 23080 bytes left 20:20:39 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r2, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r3, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) 20:20:39 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f000000c340)={0x0, 0x0, &(0x7f0000000100)=[{&(0x7f0000000000)=ANY=[@ANYBLOB="140009005e04210e00000000000000008e0000002ad357455be99e1c70fc72391c01c031ede065044368b00a03c95085d896f3aeebe7a4b2c74ca923f649"], 0x14}], 0x1}, 0x0) 20:20:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x12, 0xffffffffffffffff, 0x10001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3, 0xa0, 0xaa, 0x7f, 0x0, 0x5243, 0x80060, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040)}, 0x18008, 0x5, 0x80, 0x5, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x8001}, r2, 0x8, 0xffffffffffffffff, 0x3) io_setup(0xd29, &(0x7f0000000780)=0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x170d, 0x5, &(0x7f0000000700)=[{&(0x7f00000003c0)="4c865fbf3de00e87943a47ed97e2f969ef7761c5705f7233e2cd3f9c6ddcf720f08dc2df4afba620341199187a7b05a3d43f66eade1507c75d8e8ebc12b0a39e74e57145ebd1aaa72a3e5575e74f8f2dcb0bfbfe091bbc10f74dcb31f487d3b08acf132eccdc479fc8bada2be1b89b2a68a89be8f8d7f40f45f309b1f05f9ef2b68e20bfad34eaf1f164678980840089187b195045187486", 0x98, 0x20}, {&(0x7f0000000480)="33beee5101cae0ef2daa1c956389f183ceec87cf76cb4cd9a145", 0x1a, 0x8}, {&(0x7f00000004c0)="53fcde86c7101e76199c6cfa90a51704f10c0f878f24e8a40f156b0ab5c12c2bab73667a8b56a44c6c3fe61cf070da179faed1c0b876fb4b96339794f0e1bc1de6302b1a71ad0449cbb3e9f6bdcc39bd9001f593189ca6634e30f10259c56de23caf9eca283871a43432448280c9dfb3f671903f56fb33f4d2a28f7c3c6dbd7902ca10b60c863a020cb923acc9119a5f4fd7d4620e7d3b4b2bf650b4c2d4f9a06b37dec107de33e584b3592835d61cc35fada84d607acd663003f178e928d25ae8bc72adb2f52dd755e6f5bfa3", 0xcd}, {&(0x7f0000000680)="b00ba1acda123e97e0a8b541d8dc196d33958e0213b30507bc6f5bb8008d1fdfec88d6f51a07dd30497b8a3f71e8937ba5a234946b6be51d76fdeba71d2f976307c971ce82a646e4b2a633654b23359799b5ddab42307becfb4b2748b78c1b47e230557410b789ed918e6746efaf", 0x6e, 0x100000000}, {&(0x7f00000007c0)="1ec5ac92f31d016ff3b060a46b0dd9ce2ecc51fae6b23bcad525bb28c239bdef62566ca39bed47438358600364b09e9da59d526a23127fa2bf72086998be04efc9dc2f15085dcd2d5891b1bf41502fc43e451598f91f8cb7e2eaa2b88339c2d84a1eb24c5a65dc9651f5e9ac7282f28f51482563dea2aaa94e6d958b677eab7ff71cbd683844c7d27a740f83bc946897985d18a33e4a86875715da4af621c162cdc5acb3b13fe2f8d57d2be35a33073bd9b8463f6fe7cd69677fb542b120fbbf795ab123262769c0888aea953d465bca84102d8c0c67ca6381", 0xd9, 0x20}], 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRESHEX=0xee00, @ANYBLOB="2c6d6f64653d303160158697a658d9792c73697a653d34326d656b7432316f6d2c688467653d776974651d20bd68696e5f73697a652c6769643d0000000000c668c3e50c29000000000000bd0391c33681e5f2178fd49fb142cd7b8e66b264d2637bb4a0f488017f12f6197c1f1add4c62a78191160b2eefe842c4cc56dc7e61dff4a6d60fd0c8da5a3caccdbad54d308c4c5687e8482c9c22a2f92b108961120d42322804c34c592c722f73bcda520973394b191adbcc730dd80f4c3b969b5df4b881b7895209564c6dd5cdeb7a3d78fafe38359406fffa7e617072922ab6a301f3cfaab544d01ad3fb89a671edaa26b12784094cb0e6a271fe5af660c61db663d120e42c978b77ce6d369ccffa8bba88a3bf8fb37291454a45b0971cf0fd9a", @ANYRESHEX, @ANYBLOB="fd7443bcc13cdf749e13dafe", @ANYRESHEX, @ANYBLOB=',huge=always,fsmagic=0x0000000000000005,smackfstransmute=\\{,,permit_directio,appraise,smackfstransmute=,\x00']) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f00000019c0)={0x2, 0x80, 0x1, 0xff, 0xe8, 0x3, 0x0, 0x2c3ec332, 0x92398, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xcde, 0x2, @perf_config_ext={0x9, 0x101}, 0x200, 0xfffffffffffffff9, 0x6db, 0x0, 0xffffffff, 0x1, 0x2, 0x0, 0x2, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xa) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f00000009c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000300)={0x42, 0x30, [0x8, 0x2, 0xa1e, 0x7f], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r6, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) io_submit(r3, 0x3, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000000)="1c", 0x1}, 0x0, 0x0]) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xff, 0x1, 0x7f, 0x1f, 0x0, 0x7fffffff, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp, 0x400, 0x7fff, 0x2, 0x0, 0x0, 0x2, 0xbb06, 0x0, 0x6, 0x0, 0x100}, 0xffffffffffffffff, 0xa, r6, 0x8) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 20:20:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:39 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:20:39 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:20:39 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',caChe=fscache,version=9p2000.u,pap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 20:20:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r0 = syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r1 = socket$inet_udp(0x2, 0x2, 0x0) epoll_ctl$EPOLL_CTL_DEL(r0, 0x2, r1) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r3 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r2}, 0x2c, {'wfdno', 0x3d, r3}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffd, 0x1, @perf_config_ext, 0x2044, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x202}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x3}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x0, 0x4, 0x0, 0x7fffffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) signalfd4(r0, &(0x7f0000000040)={[0x3]}, 0x8, 0x80000) r1 = clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = syz_open_dev$tty20(0xc, 0x4, 0x0) r4 = gettid() syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000740)=ANY=[@ANYBLOB='uid=', @ANYRESHEX, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12ddf050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="98fd7b574c8efaf76d1fc01a117d85045efe585ec51a9398c174ee7a4decff4a00"/46]) r5 = openat$nvram(0xffffffffffffff9c, &(0x7f00000001c0), 0x200000, 0x0) fstat(0xffffffffffffffff, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(r5, 0xc018937b, &(0x7f0000000380)=ANY=[@ANYRES16, @ANYRES32, @ANYRESDEC, @ANYRESHEX, @ANYRESOCT=r1]) r7 = gettid() capset(&(0x7f0000000700)={0x20080522, r7}, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f0000000180)={{0x1, 0xffffffffffffffff, 0xee00, 0x0, r6, 0x0, 0x8}, 0x68b1e9ba, 0x3, 0x7, 0x5, r4, r7}) r8 = gettid() r9 = socket$packet(0x11, 0x2, 0x300) kcmp(r4, r8, 0x0, r3, r9) r10 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x1000000, 0x810, r10, 0xfff) socket$inet_udp(0x2, 0x2, 0x0) fsetxattr$security_capability(r2, &(0x7f0000000000), &(0x7f0000000140)=@v3={0x3000000, [{0x78000000, 0xfffffbff}, {0x8, 0x8c}], 0xffffffffffffffff}, 0x18, 0x1) 20:20:39 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:39 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:39 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:20:39 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mbind(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4002, &(0x7f0000000000)=0xcd5, 0x9, 0x0) r1 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x8, 0x12, 0xffffffffffffffff, 0x10001) ioctl$sock_SIOCGPGRP(0xffffffffffffffff, 0x8904, &(0x7f0000000200)=0x0) perf_event_open(&(0x7f0000000180)={0x0, 0x80, 0x3, 0xa0, 0xaa, 0x7f, 0x0, 0x5243, 0x80060, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, 0x1, @perf_bp={&(0x7f0000000040)}, 0x18008, 0x5, 0x80, 0x5, 0x1, 0x9, 0x3, 0x0, 0x1, 0x0, 0x8001}, r2, 0x8, 0xffffffffffffffff, 0x3) io_setup(0xd29, &(0x7f0000000780)=0x0) r4 = syz_mount_image$tmpfs(&(0x7f0000000340), &(0x7f0000000380)='./file0\x00', 0x170d, 0x5, &(0x7f0000000700)=[{&(0x7f00000003c0)="4c865fbf3de00e87943a47ed97e2f969ef7761c5705f7233e2cd3f9c6ddcf720f08dc2df4afba620341199187a7b05a3d43f66eade1507c75d8e8ebc12b0a39e74e57145ebd1aaa72a3e5575e74f8f2dcb0bfbfe091bbc10f74dcb31f487d3b08acf132eccdc479fc8bada2be1b89b2a68a89be8f8d7f40f45f309b1f05f9ef2b68e20bfad34eaf1f164678980840089187b195045187486", 0x98, 0x20}, {&(0x7f0000000480)="33beee5101cae0ef2daa1c956389f183ceec87cf76cb4cd9a145", 0x1a, 0x8}, {&(0x7f00000004c0)="53fcde86c7101e76199c6cfa90a51704f10c0f878f24e8a40f156b0ab5c12c2bab73667a8b56a44c6c3fe61cf070da179faed1c0b876fb4b96339794f0e1bc1de6302b1a71ad0449cbb3e9f6bdcc39bd9001f593189ca6634e30f10259c56de23caf9eca283871a43432448280c9dfb3f671903f56fb33f4d2a28f7c3c6dbd7902ca10b60c863a020cb923acc9119a5f4fd7d4620e7d3b4b2bf650b4c2d4f9a06b37dec107de33e584b3592835d61cc35fada84d607acd663003f178e928d25ae8bc72adb2f52dd755e6f5bfa3", 0xcd}, {&(0x7f0000000680)="b00ba1acda123e97e0a8b541d8dc196d33958e0213b30507bc6f5bb8008d1fdfec88d6f51a07dd30497b8a3f71e8937ba5a234946b6be51d76fdeba71d2f976307c971ce82a646e4b2a633654b23359799b5ddab42307becfb4b2748b78c1b47e230557410b789ed918e6746efaf", 0x6e, 0x100000000}, {&(0x7f00000007c0)="1ec5ac92f31d016ff3b060a46b0dd9ce2ecc51fae6b23bcad525bb28c239bdef62566ca39bed47438358600364b09e9da59d526a23127fa2bf72086998be04efc9dc2f15085dcd2d5891b1bf41502fc43e451598f91f8cb7e2eaa2b88339c2d84a1eb24c5a65dc9651f5e9ac7282f28f51482563dea2aaa94e6d958b677eab7ff71cbd683844c7d27a740f83bc946897985d18a33e4a86875715da4af621c162cdc5acb3b13fe2f8d57d2be35a33073bd9b8463f6fe7cd69677fb542b120fbbf795ab123262769c0888aea953d465bca84102d8c0c67ca6381", 0xd9, 0x20}], 0x1, &(0x7f0000001dc0)=ANY=[@ANYBLOB='\x00\x00\x00\x00\x00', @ANYRESHEX=0xee00, @ANYBLOB="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", @ANYRESHEX, @ANYBLOB="fd7443bcc13cdf749e13dafe", @ANYRESHEX, @ANYBLOB=',huge=always,fsmagic=0x0000000000000005,smackfstransmute=\\{,,permit_directio,appraise,smackfstransmute=,\x00']) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, 0xffffffffffffffff) read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f00000019c0)={0x2, 0x80, 0x1, 0xff, 0xe8, 0x3, 0x0, 0x2c3ec332, 0x92398, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xcde, 0x2, @perf_config_ext={0x9, 0x101}, 0x200, 0xfffffffffffffff9, 0x6db, 0x0, 0xffffffff, 0x1, 0x2, 0x0, 0x2, 0x0, 0x1}, 0xffffffffffffffff, 0xffffffffffffffff, r5, 0xa) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r4, 0xd000943e, &(0x7f00000009c0)={0x0, 0x0, "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", "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"}) ioctl$BTRFS_IOC_INO_PATHS(r0, 0xc0389423, &(0x7f0000000300)={0x42, 0x30, [0x8, 0x2, 0xa1e, 0x7f], &(0x7f0000000240)=[0x0, 0x0, 0x0, 0x0, 0x0, 0x0]}) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r6, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) io_submit(r3, 0x3, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r6, &(0x7f0000000000)="1c", 0x1}, 0x0, 0x0]) perf_event_open(&(0x7f0000000100)={0x1, 0x80, 0xff, 0x1, 0x7f, 0x1f, 0x0, 0x7fffffff, 0x1, 0xc, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x4, 0x1, @perf_bp, 0x400, 0x7fff, 0x2, 0x0, 0x0, 0x2, 0xbb06, 0x0, 0x6, 0x0, 0x100}, 0xffffffffffffffff, 0xa, r6, 0x8) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 20:20:39 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x22}}}}, [@NL80211_ATTR_TSID={0x5, 0xd2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) r3 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r3, 0x409, 0xd) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) r4 = getpgrp(0xffffffffffffffff) syz_open_procfs(r4, &(0x7f0000000100)='fd/3\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000016c0)={0x60, 0x6, 0x0, "427b47e714e3d0e01a72ca0c8110461440fb31453b998dcd659410bfbf35ac252cd71956cc62ec0ccc2644b9e089bbb182ad938450a8d6f05ea9df0bf7b42a97fe5af943890a14f98d501e47fcce1728e71792c8ded87108a3adbf24163686a2"}) 20:20:54 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:54 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r2, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f00000001c0)="439abeba46a552b7725ffa72b48b0d33cf59309c3b885abe", 0x18, 0x1f}], 0x400, &(0x7f0000000480)=ANY=[@ANYBLOB='uid=', @ANYRESHEX=r3, @ANYBLOB="2c7569643d4a433dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72205a21d8cf745ebb8336f79892473bb4614d897caa3f7aa759a5890e01b334f1bb7a128cf697319bc6b5d551e43beb437", @ANYRESHEX=0xee01, @ANYBLOB="2c6f626a5f747970653d25db3a2c646f6e745f61707072616973652c7375626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7569643e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) 20:20:54 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:20:54 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',caChe=fscache,version=9p2000.u,pap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) 20:20:54 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:20:54 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:20:54 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x22}}}}, [@NL80211_ATTR_TSID={0x5, 0xd2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) r3 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r3, 0x409, 0xd) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) r4 = getpgrp(0xffffffffffffffff) syz_open_procfs(r4, &(0x7f0000000100)='fd/3\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000016c0)={0x60, 0x6, 0x0, "427b47e714e3d0e01a72ca0c8110461440fb31453b998dcd659410bfbf35ac252cd71956cc62ec0ccc2644b9e089bbb182ad938450a8d6f05ea9df0bf7b42a97fe5af943890a14f98d501e47fcce1728e71792c8ded87108a3adbf24163686a2"}) 20:20:54 executing program 6: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, 0x0) r1 = socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) syncfs(r0) sendmsg$ETHTOOL_MSG_PAUSE_SET(r1, &(0x7f0000000440)={0x0, 0x0, 0x0}, 0x0) r2 = pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_DEL_TX_TS(r2, &(0x7f0000000500)={&(0x7f0000000140)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f00000004c0)={&(0x7f0000000480)={0x30, 0x0, 0x0, 0x70bd26, 0x25dfdbfd, {{}, {@val={0x8}, @val={0xc, 0x99, {0x6, 0x22}}}}, [@NL80211_ATTR_TSID={0x5, 0xd2, 0x5}]}, 0x30}, 0x1, 0x0, 0x0, 0x40004}, 0x20000008) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)={{0x1, 0x1, 0x18}, './file0\x00'}) ftruncate(r1, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f00000000c0)='./file0\x00', 0x0, 0x2, &(0x7f0000000040)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000000040)=ANY=[]) ioctl$F2FS_IOC_MOVE_RANGE(r1, 0xc020f509, &(0x7f0000001680)={r0, 0x101, 0x2, 0x778d}) r3 = memfd_create(&(0x7f0000000400)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9\xbb\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\xa4\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x2) fcntl$addseals(r3, 0x409, 0xd) syz_io_uring_setup(0xaaf, &(0x7f0000000200), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f00000001c0), &(0x7f0000000380)) r4 = getpgrp(0xffffffffffffffff) syz_open_procfs(r4, &(0x7f0000000100)='fd/3\x00') ioctl$SCSI_IOCTL_SEND_COMMAND(0xffffffffffffffff, 0x1, &(0x7f00000016c0)={0x60, 0x6, 0x0, "427b47e714e3d0e01a72ca0c8110461440fb31453b998dcd659410bfbf35ac252cd71956cc62ec0ccc2644b9e089bbb182ad938450a8d6f05ea9df0bf7b42a97fe5af943890a14f98d501e47fcce1728e71792c8ded87108a3adbf24163686a2"}) 20:20:54 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 274.004403] 9pnet_fd: Insufficient options for proto=fd [ 286.858932] 9pnet_fd: Insufficient options for proto=fd 20:21:07 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:21:07 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r3, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r4}}]}}) 20:21:07 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',caChe=fscache,version=9p2000.u,pap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) 20:21:07 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:21:07 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:21:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x6, 0x3, &(0x7f0000000540)=[{&(0x7f0000000300)="b268bce1b81e868ca422059f6f0da80973da91482542dd99e65740bf22949bdeb2d7ea1f6b4c16edcf1c6ae58be574add1bafd9d85e3fb3940d8944aa77fdb5ae4743aa3d75add49f753ff368d9a2fda7365440e4727cefb8907a3543517322f5f8a2efd2798a5b07fc72414956d8c6fd48181bbd4f61860e0d3172f92b3485fefeeb00a26cbbd96a1932663da9e8855955b5b1adafa61d825a24e69d88a0fdb680faa7a5b88810e6b2a777c77f98f744811772a02c06ab9b708063c05c24c3719e76a9f2305ccd19b8c9187236a96e9e13035a7ab581b52ad59376469dcac594bce596fe414827b2d3cd4ca7e", 0xed, 0x200}, {&(0x7f0000000400)="2a1b7137c7721a024a24d16e540f0bdf6deee5b74176c86cfa72f00624d68ff47b1bf2d93506f2c198b6b8e8eb7d3107f0864c8563b45a4f81c969583eaeccaf3bfb4913f1b3f15081a1812ab524293e658ad04215fa55cc881754f788f16ba34c5b4ee114f30b51e62c32139267ffe65d31470967cea081bd4b9b297a2f05f383dfd27f9ea9b692e21647e5e09a4f25fb077a37011dddc3928a21bf03cf63986f85a8df2ba41ff454697a71d458344f6ed1530a21fed35483f4458b0a", 0xbd, 0x6}, {&(0x7f0000000500)="d644df8679682c7918d980bfd540c15f1e4b3057795678629967d242991bee1b553c9687103881", 0x27, 0x6}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="6875676e657665722c6769643d060000000000f98ba72c187ad9d7ce0020d500070000", @ANYRESHEX=0xee01, @ANYBLOB=',huge=never,gid=', @ANYRESHEX=0xee00, @ANYBLOB=',subj_role=,,defcontext=system_u,func=FILE_CHECK,\x00']) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000640)=0x40000000) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=@v1={0x1000000, [{0x0, 0x7fffffff}]}, 0xc, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x12100}, 0x0) 20:21:07 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:07 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 286.981408] 9pnet_fd: Insufficient options for proto=fd 20:21:07 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, 0x0) fallocate(0xffffffffffffffff, 0x10, 0x4, 0x0) openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) r0 = syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x6, 0x3, &(0x7f0000000540)=[{&(0x7f0000000300)="b268bce1b81e868ca422059f6f0da80973da91482542dd99e65740bf22949bdeb2d7ea1f6b4c16edcf1c6ae58be574add1bafd9d85e3fb3940d8944aa77fdb5ae4743aa3d75add49f753ff368d9a2fda7365440e4727cefb8907a3543517322f5f8a2efd2798a5b07fc72414956d8c6fd48181bbd4f61860e0d3172f92b3485fefeeb00a26cbbd96a1932663da9e8855955b5b1adafa61d825a24e69d88a0fdb680faa7a5b88810e6b2a777c77f98f744811772a02c06ab9b708063c05c24c3719e76a9f2305ccd19b8c9187236a96e9e13035a7ab581b52ad59376469dcac594bce596fe414827b2d3cd4ca7e", 0xed, 0x200}, {&(0x7f0000000400)="2a1b7137c7721a024a24d16e540f0bdf6deee5b74176c86cfa72f00624d68ff47b1bf2d93506f2c198b6b8e8eb7d3107f0864c8563b45a4f81c969583eaeccaf3bfb4913f1b3f15081a1812ab524293e658ad04215fa55cc881754f788f16ba34c5b4ee114f30b51e62c32139267ffe65d31470967cea081bd4b9b297a2f05f383dfd27f9ea9b692e21647e5e09a4f25fb077a37011dddc3928a21bf03cf63986f85a8df2ba41ff454697a71d458344f6ed1530a21fed35483f4458b0a", 0xbd, 0x6}, {&(0x7f0000000500)="d644df8679682c7918d980bfd540c15f1e4b3057795678629967d242991bee1b553c9687103881", 0x27, 0x6}], 0x1, &(0x7f0000000680)=ANY=[@ANYBLOB="6875676e657665722c6769643d060000000000f98ba72c187ad9d7ce0020d500070000", @ANYRESHEX=0xee01, @ANYBLOB=',huge=never,gid=', @ANYRESHEX=0xee00, @ANYBLOB=',subj_role=,,defcontext=system_u,func=FILE_CHECK,\x00']) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000640)=0x40000000) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, 0x0}, 0x0) fsetxattr$security_capability(0xffffffffffffffff, &(0x7f0000000140), &(0x7f0000000180)=@v1={0x1000000, [{0x0, 0x7fffffff}]}, 0xc, 0x2) syz_io_uring_submit(0x0, 0x0, &(0x7f00000001c0)=@IORING_OP_RECV=@use_registered_buffer={0x1b, 0x0, 0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x12100}, 0x0) 20:21:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:20 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) 20:21:20 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x80080, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x4, 0xff, 0x0, 0x0, 0x3, 0xa1014, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x80, 0x7, 0x7fffffff, 0x4, 0x101, 0x9, 0x6, 0x0, 0x4, 0x0, 0x87}, 0xffffffffffffffff, 0x4, r0, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x2540c1, 0x85) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:21:20 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r3, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}]}}) 20:21:20 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:20 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:21:20 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:21:20 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) [ 300.255376] 9pnet_fd: Insufficient options for proto=fd [ 300.271148] 9pnet_fd: Insufficient options for proto=fd 20:21:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:20 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, 0x0, &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 300.331712] 9pnet_fd: Insufficient options for proto=fd 20:21:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 300.454074] 9pnet_fd: Insufficient options for proto=fd 20:21:20 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:21 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, 0x0, &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 300.574991] 9pnet_fd: Insufficient options for proto=fd 20:21:21 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) socket$inet_udp(0x2, 0x2, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:21 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, 0x0, &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 300.652079] 9pnet_fd: Insufficient options for proto=fd 20:21:21 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:21:21 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r3 = fcntl$dupfd(r1, 0x406, r0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r2, 0x40082406, &(0x7f00000004c0)='9p\x00') 20:21:21 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:21:36 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', 0x0, 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:36 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:21:36 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) syz_open_dev$vcsa(&(0x7f0000000000), 0x5, 0x200000) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:36 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:21:36 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r3 = fcntl$dupfd(r1, 0x406, r0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:21:36 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:21:36 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x80080, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x4, 0xff, 0x0, 0x0, 0x3, 0xa1014, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x80, 0x7, 0x7fffffff, 0x4, 0x101, 0x9, 0x6, 0x0, 0x4, 0x0, 0x87}, 0xffffffffffffffff, 0x4, r0, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x2540c1, 0x85) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:21:36 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r3, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}]}}) 20:21:37 executing program 3: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/pids.max\x00', 0xa281, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:37 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', 0x0, 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:37 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', 0x0, 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:37 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:37 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:21:37 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:37 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 317.060146] 9pnet_fd: Insufficient options for proto=fd 20:21:37 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, 0x0) 20:21:37 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 317.181609] 9pnet_fd: Insufficient options for proto=fd 20:21:52 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:52 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:21:52 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, 0x0) 20:21:52 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:21:52 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:21:52 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, r0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:21:52 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x6, 0x1, &(0x7f0000000200)=[{&(0x7f0000000280)="4300f78bb1a890cf22e772b48b0d33", 0xffffffffffffffc8, 0x23}], 0x400, &(0x7f0000000380)=ANY=[@ANYBLOB='uid=', @ANYRESDEC=r1, @ANYBLOB="2c7569643d4ac33dcd38941f299300141a2c8ddd21d6ae5521fe04b7681c2f48b1850800000000000000a9fcaa95d68bf12d42050267f611174fe3d903d097eb424a8dc72209a21d8cf745ebb8336f79892473bb4614d897ca38a5251b9a5890e03b334f1b95a128cf697319bc6b5d551e00000000", @ANYRES64=r3, @ANYBLOB="2c00626a5f747970653d25db3a2c646f6e745f61707072616973652c73041c14b33cb064a5e30b4e75626a5f726f6c653d7d2c736d61636b66737472616e736d7574653d2b2c7505003e", @ANYRESDEC=0xee00, @ANYBLOB="60dc"]) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}]}}) 20:21:52 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r3 = fcntl$dupfd(r1, 0x406, r0) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r4, {0x4}}, './file0\x00'}) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) [ 331.743926] 9pnet_fd: Insufficient options for proto=fd 20:21:52 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, 0x0, &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:52 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, 0x0) 20:21:52 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:21:52 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, 0x0, &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:21:52 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:21:52 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, 0x0, &(0x7f0000000100), 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:03 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, r0) socket$inet6_udp(0xa, 0x2, 0x0) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:03 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff}, 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f00000007c0)={0x0, 0x2, 0x1, [0xc0d2, 0x564, 0x7, 0x0, 0x2], [0x1ff, 0x0, 0x8, 0x8001, 0x5, 0x8, 0x2, 0x6, 0xfff, 0x8, 0x78, 0x1, 0x2355, 0x25, 0x4, 0x5, 0x5, 0x40, 0x81, 0xfffffffffffffffb, 0xffffffffffffffc0, 0x9, 0x9, 0x100000000, 0x8, 0x9c1, 0x81, 0x6, 0x4, 0x9, 0x200, 0x9, 0x2, 0x10001, 0x3, 0x2, 0x8cb, 0x4, 0xffffffff00000000, 0x200000000000, 0x100, 0x9, 0x7cd, 0x10001, 0xeac6, 0xaf2, 0xe3, 0x80000001, 0x8, 0xd2, 0xd83, 0xffffffff, 0x10001, 0x1, 0x4e2, 0x1000, 0x100000001, 0x100000000, 0x2, 0x2, 0x10001, 0xa43c, 0x2, 0xaf05, 0x0, 0xffffffffffffffcb, 0x81, 0x8001, 0x1, 0x3, 0x3, 0xff, 0x1, 0x1ff, 0xf, 0xfff, 0x9, 0x2cb, 0x1f, 0xae, 0x1, 0x4, 0x7fffffff, 0x81, 0x7, 0x401, 0x0, 0x4, 0x3, 0x4000000000, 0x3f, 0xe1, 0xffff, 0x7, 0x200, 0x5, 0xc000000, 0xfa, 0xa0, 0x7, 0x1, 0x16, 0x5, 0x0, 0x100000001, 0x2, 0x674, 0xdfb, 0xb4b, 0x7ff, 0x1ff, 0x4, 0x3, 0x1, 0x6, 0xffff, 0x613a, 0x100000000, 0x3f, 0x91, 0x8]}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r2}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r4}}]}}) 20:22:03 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:03 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:03 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:22:03 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:03 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 343.381001] 9pnet_fd: Insufficient options for proto=fd 20:22:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', 0x0, 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:03 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r1}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r3}}]}}) 20:22:03 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:03 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:03 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_proto_private(0xffffffffffffffff, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r1}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) [ 343.517027] 9pnet_fd: Insufficient options for proto=fd 20:22:03 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', 0x0, 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:04 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_proto_private(0xffffffffffffffff, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r1}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:22:04 executing program 0: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:04 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:04 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, r0) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:04 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 343.654585] 9pnet_fd: Insufficient options for proto=fd 20:22:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:17 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', 0x0, 0x81004c, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:17 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:17 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) ioctl$sock_proto_private(0xffffffffffffffff, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt={'fowner<', r1}}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:22:17 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 356.973970] 9pnet_fd: Insufficient options for proto=fd 20:22:17 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:17 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:17 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:17 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:22:17 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 357.110799] 9pnet_fd: Insufficient options for proto=fd 20:22:17 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, 0x0) 20:22:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) [ 357.266282] 9pnet_fd: Insufficient options for proto=fd 20:22:17 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:17 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:17 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, 0x0) 20:22:17 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:17 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:17 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}}) 20:22:17 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:17 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:17 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, 0x0) 20:22:18 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:18 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}]}}) 20:22:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:29 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:29 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:22:29 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:22:29 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:29 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:29 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:29 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 369.143999] 9pnet_fd: Insufficient options for proto=fd 20:22:29 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:22:29 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:29 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 369.327445] 9pnet_fd: Insufficient options for proto=fd 20:22:42 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:42 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:42 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:42 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:42 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:22:42 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:42 executing program 3: openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) [ 381.940862] 9pnet_fd: Insufficient options for proto=fd 20:22:42 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) [ 382.060780] 9pnet_fd: Insufficient options for proto=fd 20:22:42 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:42 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:42 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:42 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 382.194573] 9pnet_fd: Insufficient options for proto=fd 20:22:42 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:42 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:42 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:22:42 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) [ 382.318969] 9pnet_fd: Insufficient options for proto=fd 20:22:42 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:42 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:54 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:54 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:22:54 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:54 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}]}}) 20:22:54 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:54 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:22:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:54 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:54 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:55 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}]}}) 20:22:55 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:55 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:22:55 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:22:55 executing program 3: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 20:22:55 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:09 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:23:09 executing program 7: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:09 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:09 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:23:09 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:09 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:09 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:21 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:23:21 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:23:21 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:21 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:21 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:21 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:22 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:22 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:22 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:23:33 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:33 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:33 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:33 executing program 4: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:23:33 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:23:33 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:33 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:23:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:34 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:34 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:34 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:23:34 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:34 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:47 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:47 executing program 6: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:47 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:47 executing program 3: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:47 executing program 4: clone3(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:23:47 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 447.154343] perf: interrupt took too long (5314 > 5247), lowering kernel.perf_event_max_sample_rate to 37000 [ 447.158630] perf: interrupt took too long (10567 > 10507), lowering kernel.perf_event_max_sample_rate to 18000 20:23:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:47 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:47 executing program 6: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 447.335047] perf: interrupt took too long (13223 > 13208), lowering kernel.perf_event_max_sample_rate to 15000 20:23:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) [ 447.354959] perf: interrupt took too long (16541 > 16528), lowering kernel.perf_event_max_sample_rate to 12000 20:23:47 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:23:47 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:47 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:23:48 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:48 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:23:48 executing program 4: clone3(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:23:48 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:02 executing program 4: clone3(0x0, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:24:02 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 6: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:02 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:02 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:02 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:02 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:02 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:02 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:16 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:16 executing program 3: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:16 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:16 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:16 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:16 executing program 4: clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:24:16 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:16 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:16 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:17 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:17 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:17 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:17 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:17 executing program 3: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) pipe2$9p(&(0x7f00000000c0), 0x4800) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:24:27 executing program 4: clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:24:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:27 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:27 executing program 3: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:27 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:27 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:27 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:27 executing program 4: clone3(&(0x7f0000000640)={0x0, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:24:27 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:27 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:28 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:28 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:28 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:43 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:43 executing program 4: clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:24:43 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:43 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:43 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:43 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:43 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 4: clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:24:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 1: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:24:55 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:24:55 executing program 4: clone3(&(0x7f0000000640)={0x123363500, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r2}}]}}) 20:24:55 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:24:55 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:07 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:07 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:25:07 executing program 2: r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:07 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:07 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:07 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:07 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r0}}]}}) 20:25:07 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:07 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) 20:25:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:19 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r0}}]}}) 20:25:19 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:19 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:19 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:19 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:19 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(0xffffffffffffffff, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r0}}]}}) 20:25:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) 20:25:19 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:20 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x0, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:25:20 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:33 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) 20:25:33 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:33 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x0, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:25:33 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:33 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:33 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:33 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x0, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:25:33 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:33 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:34 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:34 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:34 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:45 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:45 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:25:45 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:45 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, r0) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:45 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:45 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:45 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) [ 564.872136] perf: interrupt took too long (20707 > 20676), lowering kernel.perf_event_max_sample_rate to 9000 20:25:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:45 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:45 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x5, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:45 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:45 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:45 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:25:45 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:25:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:45 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 565.322781] syz-executor.1 (5504) used greatest stack depth: 22896 bytes left 20:25:59 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:59 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') fcntl$dupfd(r1, 0x406, r0) socket$inet6_udp(0xa, 0x2, 0x0) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:25:59 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:25:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:00 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:00 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:00 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:00 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:00 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:11 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:11 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:11 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:11 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:11 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:11 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) 20:26:11 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:11 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:11 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:24 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:24 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:24 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 0: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:24 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:24 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:24 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:24 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, 0x0, 0x2, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:24 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:24 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:24 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:26:24 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:24 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:36 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:36 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:26:36 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:36 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:36 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000140)='/proc/mdstat\x00', 0x0, 0x0) r1 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) mount$9p_fd(0x0, &(0x7f0000000080)='./cgroup/pids.max\x00', &(0x7f0000000100), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[], [{@permit_directio}, {@fowner_eq={'fowner', 0x3d, 0xee01}}, {@fsname={'fsname', 0x3d, '/dev/vcsa#\x00'}}]}}) 20:26:36 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:36 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:36 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:36 executing program 3: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:36 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:36 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0x80080, 0x0) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x4, 0x4, 0xff, 0x0, 0x0, 0x3, 0xa1014, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_bp={&(0x7f0000000100), 0x4}, 0x80, 0x7, 0x7fffffff, 0x4, 0x101, 0x9, 0x6, 0x0, 0x4, 0x0, 0x87}, 0xffffffffffffffff, 0x4, r0, 0x9) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000040)='./file1\x00', 0x2540c1, 0x85) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f0000000000)={0xa, 0x0, 0x0, @mcast2, 0x4}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) 20:26:36 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:36 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:36 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:36 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:49 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:26:49 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) 20:26:49 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:49 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e8") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:26:49 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:49 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:49 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:49 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:26:49 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:49 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:26:49 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:26:49 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:02 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',caChe=fscache,version=9p2000.u,pap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) 20:27:02 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e8") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:27:02 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:02 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:02 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:02 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:27:02 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:02 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:02 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e8") stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:27:03 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, 0x0}) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt={'fowner<', r1}}]}}) 20:27:03 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:27:03 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:03 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:03 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000000)='./file0\x00', &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}]}}) 20:27:03 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:03 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:15 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:15 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, &(0x7f0000000040), 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}]}}) 20:27:15 executing program 0: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x7}, 0x4080, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffff}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000640)={0x4, 0x80, 0x1, 0x20, 0x3f, 0xff, 0x0, 0x97, 0x10044, 0xa, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x6, 0x1, @perf_config_ext={0x5, 0x4e2ee9b9}, 0x10000, 0x80000001, 0x2, 0x9, 0x8, 0x3, 0x20, 0x0, 0x7, 0x0, 0x1}, 0xffffffffffffffff, 0x5, r1, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x2002}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x2, 0x0, 0x0, 0x840040, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x227d, &(0x7f0000000140)={0x0, 0x1240, 0x8, 0x2, 0xc1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffb000/0x4000)=nil, &(0x7f0000000340), &(0x7f0000000200)) ioctl$SECCOMP_IOCTL_NOTIF_RECV(0xffffffffffffffff, 0xc0502100, &(0x7f0000000540)={0x0, 0x0}) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r4 = fcntl$dupfd(r1, 0x406, r0) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r4, 0xc018937c, &(0x7f0000000500)={{0x1, 0x1, 0x18, r5, {0x4}}, './file0\x00'}) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_SET_FILTER(r3, 0x40082406, &(0x7f00000004c0)='9p\x00') perf_event_open(&(0x7f00000005c0)={0x2, 0x80, 0x1, 0x3, 0x5, 0x3, 0x0, 0x100000000, 0x102c0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x2, @perf_bp={&(0x7f00000001c0)}, 0x54228, 0x8, 0x1, 0x6, 0x101, 0x50, 0x20, 0x0, 0x42db, 0x0, 0x2}, r2, 0x10, 0xffffffffffffffff, 0x2) mount$9p_fd(0x0, &(0x7f0000000240)='./file0\x00', &(0x7f0000000300), 0x242880, &(0x7f0000000380)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB=',caChe=fscache,version=9p2000.u,pap,loose,\x00osixacl,access=', @ANYRESDEC, @ANYBLOB=',access=any,cache=none,subj_role=,smackfsroot=,fsname=\\,smackfshat=,(^\\)\a^,hash,smackfsfloor=^#\",func=FIRMWARE_CHECK,\x00']) 20:27:15 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:15 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:27:15 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:15 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:15 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, 0x0) read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:15 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:15 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0xcc0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}]}}) 20:27:15 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:15 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:15 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:27:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, 0x0) read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:27 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)={'trans=fd,', {}, 0x2c, {}, 0x2c, {[{@privport}], [{@fowner_lt}, {@mask={'mask', 0x3d, '^MAY_READ'}}, {@fowner_lt}]}}) 20:27:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 1) 20:27:27 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:27:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:27 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:27 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:27 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:27 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:27:27 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:27 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, 0x0) read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:27 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:27 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 2) 20:27:27 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:27 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") (fail_nth: 1) stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:27:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:27 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:27:27 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 666.971332] FAULT_INJECTION: forcing a failure. [ 666.971332] name fail_usercopy, interval 1, probability 0, space 0, times 1 [ 666.972949] CPU: 0 PID: 5872 Comm: syz-executor.4 Not tainted 5.19.0-rc4-next-20220701 #1 [ 666.974040] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 666.975531] Call Trace: [ 666.975895] [ 666.976204] dump_stack_lvl+0x8b/0xb3 [ 666.976736] should_fail.cold+0x5/0xa [ 666.977259] _copy_from_user+0x2a/0x170 [ 666.977803] get_user_ifreq+0x113/0x1b0 [ 666.978350] sock_do_ioctl+0x130/0x230 [ 666.978891] ? put_user_ifreq+0xb0/0xb0 20:27:27 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) [ 666.979440] ? vfs_fileattr_set+0xb80/0xb80 [ 666.980153] ? ioctl_has_perm.constprop.0.isra.0+0x29a/0x400 [ 666.980921] ? ioctl_has_perm.constprop.0.isra.0+0x2a4/0x400 [ 666.981691] ? selinux_inode_getsecctx+0x90/0x90 [ 666.982354] sock_ioctl+0x41c/0x670 [ 666.982866] ? lock_is_held_type+0xd7/0x130 [ 666.983462] ? br_ioctl_call+0xb0/0xb0 [ 666.984044] ? selinux_file_ioctl+0xb1/0x260 [ 666.984644] ? br_ioctl_call+0xb0/0xb0 [ 666.985208] __x64_sys_ioctl+0x196/0x210 [ 666.985776] do_syscall_64+0x3b/0x90 [ 666.986309] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 666.987029] RIP: 0033:0x7f7058bebb19 [ 666.987550] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 666.989966] RSP: 002b:00007f7056161188 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 666.990965] RAX: ffffffffffffffda RBX: 00007f7058cfef60 RCX: 00007f7058bebb19 [ 666.991932] RDX: 0000000020000000 RSI: 0000000000008913 RDI: 0000000000000004 [ 666.992867] RBP: 00007f70561611d0 R08: 0000000000000000 R09: 0000000000000000 [ 666.993792] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 666.994735] R13: 00007ffc70e7ca0f R14: 00007f7056161300 R15: 0000000000022000 [ 666.995698] 20:27:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 3) 20:27:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:38 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:27:38 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, 0x0, 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:38 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:27:38 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:38 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:38 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x2, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) [ 678.285302] FAULT_INJECTION: forcing a failure. [ 678.285302] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 678.287173] CPU: 0 PID: 5897 Comm: syz-executor.0 Not tainted 5.19.0-rc4-next-20220701 #1 [ 678.288290] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 678.289809] Call Trace: [ 678.290155] [ 678.290473] dump_stack_lvl+0x8b/0xb3 [ 678.291022] should_fail.cold+0x5/0xa [ 678.291567] _copy_to_iter+0x393/0x1860 [ 678.292145] ? lock_release+0x3b2/0x750 [ 678.292710] ? copy_page_from_iter+0xa00/0xa00 [ 678.293355] ? lock_downgrade+0x6d0/0x6d0 [ 678.293936] ? lock_is_held_type+0xd7/0x130 [ 678.294541] ? lock_is_held_type+0xd7/0x130 [ 678.295144] ? __virt_addr_valid+0xfe/0x340 [ 678.295773] ? __check_object_size+0x380/0x800 [ 678.296424] seq_read_iter+0xdc7/0x12b0 [ 678.297015] seq_read+0x2c7/0x420 [ 678.297519] ? seq_read_iter+0x12b0/0x12b0 [ 678.298128] ? inode_security+0x105/0x130 [ 678.298721] ? security_file_permission+0xb1/0xd0 [ 678.299412] ? seq_read_iter+0x12b0/0x12b0 [ 678.300032] vfs_read+0x1ea/0x5d0 [ 678.300533] ksys_read+0x127/0x250 [ 678.301024] ? __ia32_sys_pwrite64+0x220/0x220 [ 678.301672] ? syscall_enter_from_user_mode+0x1d/0x50 [ 678.302382] ? syscall_enter_from_user_mode+0x1d/0x50 [ 678.303104] do_syscall_64+0x3b/0x90 [ 678.303643] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 678.304337] RIP: 0033:0x7fb3b877eb19 [ 678.304856] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 678.307282] RSP: 002b:00007fb3b5cf4188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 678.308340] RAX: ffffffffffffffda RBX: 00007fb3b8891f60 RCX: 00007fb3b877eb19 [ 678.309303] RDX: 00000000200000e9 RSI: 0000000020000040 RDI: 0000000000000003 [ 678.310268] RBP: 00007fb3b5cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 678.311231] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 678.312204] R13: 00007ffdf5bcb71f R14: 00007fb3b5cf4300 R15: 0000000000022000 [ 678.313195] [ 678.398079] cgroup: fork rejected by pids controller in /syz4 20:27:38 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:38 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:27:38 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 4) 20:27:39 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:39 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) [ 678.608039] FAULT_INJECTION: forcing a failure. [ 678.608039] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 678.610376] CPU: 0 PID: 6018 Comm: syz-executor.0 Not tainted 5.19.0-rc4-next-20220701 #1 [ 678.611495] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 678.613007] Call Trace: [ 678.613366] [ 678.613683] dump_stack_lvl+0x8b/0xb3 [ 678.614233] should_fail.cold+0x5/0xa [ 678.614773] _copy_to_user+0x2a/0x140 [ 678.615316] simple_read_from_buffer+0xcc/0x160 [ 678.615987] proc_fail_nth_read+0x194/0x220 [ 678.616582] ? proc_sessionid_read+0x220/0x220 [ 678.617222] ? security_file_permission+0xb1/0xd0 [ 678.617904] ? proc_sessionid_read+0x220/0x220 [ 678.618532] vfs_read+0x1ea/0x5d0 [ 678.619036] ksys_read+0x127/0x250 [ 678.619520] ? __ia32_sys_pwrite64+0x220/0x220 [ 678.620184] ? syscall_enter_from_user_mode+0x1d/0x50 [ 678.620896] ? syscall_enter_from_user_mode+0x1d/0x50 [ 678.621613] do_syscall_64+0x3b/0x90 [ 678.622148] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 678.622852] RIP: 0033:0x7fb3b873169c [ 678.623371] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 678.625807] RSP: 002b:00007fb3b5cf4170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 678.626831] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007fb3b873169c [ 678.627810] RDX: 000000000000000f RSI: 00007fb3b5cf41e0 RDI: 0000000000000004 [ 678.628779] RBP: 00007fb3b5cf41d0 R08: 0000000000000000 R09: 0000000000000000 [ 678.629740] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 678.630693] R13: 00007ffdf5bcb71f R14: 00007fb3b5cf4300 R15: 0000000000022000 [ 678.631710] 20:27:50 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x4b47, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:27:50 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:50 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:27:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:50 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:50 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:27:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x10) 20:27:50 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:27:50 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:50 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:27:50 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:27:50 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, 0x0, 0x0) 20:27:50 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:27:50 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x7ffffffff000) 20:27:51 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:27:51 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x4b49, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:27:51 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, 0x0, 0x0) 20:28:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') openat$sysfs(0xffffffffffffff9c, &(0x7f0000000100)='/sys/module/rfkill', 0x0, 0xd4) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:05 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:05 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x5411, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:28:05 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, 0x0, 0x0) 20:28:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:05 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:28:05 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:28:05 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:28:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:05 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0xfc, 0x3, 0x5, 0x7b, 0x0, 0x0, 0x80080, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0xe0, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x8400, 0x6, 0x0, 0x2, 0x2, 0x6, 0x100, 0x0, 0x3f, 0x0, 0x5}, 0x0, 0x0, r1, 0x1) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:05 executing program 2: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:28:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 1) 20:28:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:19 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:28:19 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, 0xffffffffffffffff, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:28:19 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:28:19 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:19 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x541b, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:28:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r1, 0x4008240b, &(0x7f0000000100)={0x2, 0x80, 0x6, 0x80, 0xff, 0x6, 0x0, 0x8000000000000000, 0xc8000, 0xa, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x2, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x8100, 0x5, 0x0, 0x8, 0x3f, 0x800, 0x7, 0x0, 0x7, 0x0, 0x6}) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x8) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 2) 20:28:19 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:28:19 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) 20:28:19 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) write(r0, &(0x7f0000000000)="4a0cd2c5fc664ad1fa79625ac8f53b08bfae53728c31d7cf03444d8dfe4fe3fa92130de4c5d87f0d584cda4dbfed25e6cdd348bbb9ba929bd68371e057a57c4aa2aea594dad61b96dd1c5e", 0x4b) syz_emit_ethernet(0x4a, &(0x7f00000001c0)=ANY=[@ANYBLOB="aaaaaaaaaaaaffffff6fb1ff08004500003c0000000000069078ac141400ac1414bb0000000026730a62431c2c8139af5ed390228b05abdaab7b00d21020ed26ee3b3d7a4ef279e25c2f2818751edfb2800e0cc0c1e1101ef177eaeec046bef2275d0b98fcabf4102eafe3c010a6e121dd67b5d17d03b9f04d07a4caa05d61ad6d95e250fabd5b8c8631adcd1c641664259d4c", @ANYRES32=0x41424344, @ANYRES32=0x41424344, @ANYBLOB="a000000090780000fe06e2d4c3d9220b702f0b45d0c272a8a4000000"], 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000100)=""/161, 0xa1) r2 = dup3(r1, r0, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r2, 0x2401, 0x1) 20:28:19 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:28:19 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 3) 20:28:19 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:28:19 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:28:19 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x5421, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) [ 719.550221] FAULT_INJECTION: forcing a failure. [ 719.550221] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 719.551785] CPU: 0 PID: 6538 Comm: syz-executor.2 Not tainted 5.19.0-rc4-next-20220701 #1 [ 719.552858] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 719.554269] Call Trace: [ 719.554598] [ 719.554918] dump_stack_lvl+0x8b/0xb3 [ 719.555416] should_fail.cold+0x5/0xa [ 719.555940] _copy_to_iter+0x393/0x1860 [ 719.556493] ? lock_release+0x3b2/0x750 [ 719.557021] ? copy_page_from_iter+0xa00/0xa00 [ 719.557740] ? lock_downgrade+0x6d0/0x6d0 [ 719.558294] ? lock_is_held_type+0xd7/0x130 [ 719.558862] ? lock_is_held_type+0xd7/0x130 [ 719.559446] ? __virt_addr_valid+0xfe/0x340 [ 719.560030] ? __check_object_size+0x380/0x800 [ 719.560659] seq_read_iter+0xdc7/0x12b0 [ 719.561224] seq_read+0x2c7/0x420 [ 719.561688] ? seq_read_iter+0x12b0/0x12b0 [ 719.562273] ? inode_security+0x105/0x130 [ 719.562801] ? security_file_permission+0xb1/0xd0 [ 719.563446] ? seq_read_iter+0x12b0/0x12b0 [ 719.563999] vfs_read+0x1ea/0x5d0 [ 719.564466] ksys_read+0x127/0x250 20:28:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) [ 719.564926] ? __ia32_sys_pwrite64+0x220/0x220 [ 719.565688] ? syscall_enter_from_user_mode+0x1d/0x50 [ 719.566360] ? syscall_enter_from_user_mode+0x1d/0x50 [ 719.567057] do_syscall_64+0x3b/0x90 [ 719.567552] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 719.568257] RIP: 0033:0x7fe834091b19 [ 719.568733] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 719.571035] RSP: 002b:00007fe831607188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 719.572004] RAX: ffffffffffffffda RBX: 00007fe8341a4f60 RCX: 00007fe834091b19 [ 719.572935] RDX: 00000000200000e9 RSI: 0000000020000040 RDI: 0000000000000004 [ 719.573816] RBP: 00007fe8316071d0 R08: 0000000000000000 R09: 0000000000000000 [ 719.574719] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 719.575616] R13: 00007ffe5cd19e1f R14: 00007fe831607300 R15: 0000000000022000 [ 719.576573] 20:28:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 4) 20:28:32 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x0) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:28:32 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x5450, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:28:32 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:28:32 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:28:32 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') openat(r0, &(0x7f0000000000)='./file0\x00', 0x800, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = gettid() capset(&(0x7f0000000700)={0x20080522, r1}, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x7, 0x6, 0x9, 0x0, 0x7, 0x40, 0x9, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x68b61778, 0x4, @perf_bp={&(0x7f0000000100), 0x7}, 0x12, 0x3ff, 0x8, 0xf, 0x1f, 0x6, 0x3f, 0x0, 0x7a3}, r1, 0x0, r0, 0x8) 20:28:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, 0x0, 0x0) 20:28:32 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:32 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) [ 732.541414] FAULT_INJECTION: forcing a failure. [ 732.541414] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 732.543405] CPU: 0 PID: 6659 Comm: syz-executor.2 Not tainted 5.19.0-rc4-next-20220701 #1 [ 732.544735] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 732.546504] Call Trace: [ 732.546926] [ 732.547452] dump_stack_lvl+0x8b/0xb3 [ 732.547998] should_fail.cold+0x5/0xa [ 732.548533] _copy_to_user+0x2a/0x140 [ 732.549067] simple_read_from_buffer+0xcc/0x160 [ 732.549695] proc_fail_nth_read+0x194/0x220 [ 732.550276] ? proc_sessionid_read+0x220/0x220 [ 732.550905] ? security_file_permission+0xb1/0xd0 [ 732.551591] ? proc_sessionid_read+0x220/0x220 [ 732.552229] vfs_read+0x1ea/0x5d0 [ 732.552759] ksys_read+0x127/0x250 [ 732.553275] ? __ia32_sys_pwrite64+0x220/0x220 [ 732.553914] ? syscall_enter_from_user_mode+0x1d/0x50 [ 732.554623] ? syscall_enter_from_user_mode+0x1d/0x50 [ 732.555352] do_syscall_64+0x3b/0x90 [ 732.555882] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 732.556615] RIP: 0033:0x7fe83404469c [ 732.557129] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 732.559579] RSP: 002b:00007fe831607170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 732.560628] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007fe83404469c [ 732.561601] RDX: 000000000000000f RSI: 00007fe8316071e0 RDI: 0000000000000005 [ 732.562575] RBP: 00007fe8316071d0 R08: 0000000000000000 R09: 0000000000000000 [ 732.563540] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 732.564517] R13: 00007ffe5cd19e1f R14: 00007fe831607300 R15: 0000000000022000 [ 732.565517] 20:28:33 executing program 0: perf_event_open(0x0, 0x0, 0xe, 0xffffffffffffffff, 0x6) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 1) 20:28:33 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x5451, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:28:33 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:33 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:28:33 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:28:33 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:33 executing program 0: arch_prctl$ARCH_SET_CPUID(0x1012, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:33 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 2) 20:28:45 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:28:45 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:28:45 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:28:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/166, 0xa6) 20:28:45 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x5452, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:28:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x10) 20:28:45 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 3) [ 745.328276] FAULT_INJECTION: forcing a failure. [ 745.328276] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 745.330155] CPU: 0 PID: 6918 Comm: syz-executor.3 Not tainted 5.19.0-rc4-next-20220701 #1 20:28:45 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x7ffffffff000) [ 745.331354] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 745.333021] Call Trace: [ 745.333394] [ 745.333729] dump_stack_lvl+0x8b/0xb3 [ 745.334296] should_fail.cold+0x5/0xa [ 745.334865] _copy_to_iter+0x393/0x1860 [ 745.335462] ? lock_release+0x3b2/0x750 [ 745.336037] ? copy_page_from_iter+0xa00/0xa00 [ 745.336707] ? lock_downgrade+0x6d0/0x6d0 [ 745.337299] ? lock_is_held_type+0xd7/0x130 [ 745.337928] ? lock_is_held_type+0xd7/0x130 [ 745.338558] ? __virt_addr_valid+0xfe/0x340 [ 745.339204] ? __check_object_size+0x380/0x800 [ 745.339883] seq_read_iter+0xdc7/0x12b0 [ 745.340508] seq_read+0x2c7/0x420 [ 745.341078] ? seq_read_iter+0x12b0/0x12b0 [ 745.341712] ? inode_security+0x105/0x130 [ 745.342329] ? security_file_permission+0xb1/0xd0 [ 745.343041] ? seq_read_iter+0x12b0/0x12b0 [ 745.343653] vfs_read+0x1ea/0x5d0 [ 745.344185] ksys_read+0x127/0x250 [ 745.344713] ? __ia32_sys_pwrite64+0x220/0x220 [ 745.345374] ? syscall_enter_from_user_mode+0x1d/0x50 [ 745.346106] ? syscall_enter_from_user_mode+0x1d/0x50 [ 745.346855] do_syscall_64+0x3b/0x90 [ 745.347402] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 745.348148] RIP: 0033:0x7fc5e32bdb19 [ 745.348686] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 745.351234] RSP: 002b:00007fc5e0833188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 745.352290] RAX: ffffffffffffffda RBX: 00007fc5e33d0f60 RCX: 00007fc5e32bdb19 [ 745.353322] RDX: 00000000200000e9 RSI: 0000000020000040 RDI: 0000000000000004 [ 745.354318] RBP: 00007fc5e08331d0 R08: 0000000000000000 R09: 0000000000000000 [ 745.355310] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 745.356308] R13: 00007ffddbf7f9df R14: 00007fc5e0833300 R15: 0000000000022000 [ 745.357366] 20:28:45 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r0 = openat$null(0xffffffffffffff9c, 0x0, 0x80800, 0x0) r1 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r0, 0x80083313, &(0x7f0000000240)) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(r1, 0x80083313, &(0x7f0000000040)) ioctl$BTRFS_IOC_SYNC(r1, 0x9408, 0x0) perf_event_open(&(0x7f0000000300)={0x2, 0x80, 0xff, 0x3, 0x7f, 0x95, 0x0, 0xffffffffffffff01, 0x0, 0x9, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x4, @perf_config_ext={0x7f, 0x1c7}, 0x40, 0x9, 0x1000, 0x1, 0x6, 0x2, 0x2, 0x0, 0x7290c517, 0x0, 0xced}, 0x0, 0x3, 0xffffffffffffffff, 0x2) ioctl$SNAPSHOT_AVAIL_SWAP_SIZE(0xffffffffffffffff, 0x80083313, &(0x7f00000013c0)) r2 = openat$rtc(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$RTC_IRQP_SET(r2, 0x4008700c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r2, 0x81f8943c, &(0x7f00000004c0)={0x0, ""/256, 0x0, 0x0, 0x0, 0x0, ""/16, ""/16, ""/16, 0x0, 0x0}) ioctl$BTRFS_IOC_SNAP_CREATE_V2(0xffffffffffffffff, 0x50009417, &(0x7f00000003c0)={{}, r3, 0x12, @inherit={0x88, &(0x7f0000001400)=ANY=[@ANYBLOB="00000000000000000800000000000000bb8700000000000006000000008100000900000000000000fd00000000002b00cf273346da19de8e15fae248caaa7400000000000092000000000000000180000000000000f1a7d73c97b3e292050000000100000005000000000000000100000000dbe273656c922e5d0000000100007801000000ff070000000100000000000000000000d802000000000000bfc8d2fb2cbfd017c56dfc8bf8ffc8d5aa853a3e4377c11b27843ae8a70edd09d6dc171ac66905eb3cc36528fa6362aa1e0bca54555e0b50026413e6d759877274ad127d7f8f48e025ab0ba48fcc5595954f87bcf8f9dedd7bb3"]}, @name="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"}) openat(r0, &(0x7f0000000040)='./file1\x00', 0x10400, 0x8) fcntl$getownex(r0, 0x10, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./file1\x00', 0x4042, 0x0) sendmsg$NFT_BATCH(0xffffffffffffffff, 0x0, 0x0) recvfrom(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) pwrite64(r4, &(0x7f0000000000)='y', 0xfffffe5f, 0x8040000) 20:28:56 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:28:56 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:56 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, 0x0, 0x0, 0x0) 20:28:56 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:28:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) (fail_nth: 4) 20:28:56 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x5460, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:28:56 executing program 2: r0 = syz_open_dev$hidraw(&(0x7f0000000000), 0x0, 0x181) r1 = dup2(0xffffffffffffffff, r0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r2, 0xc018937e, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1, @out_args}, './file0\x00'}) finit_module(r3, &(0x7f0000000200)='/dev/hidraw#\x00', 0x2) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) pwrite64(r2, &(0x7f0000000140)="be904a59377a67ed2a821bf017adaa3eefbf7fe7e524b56fc956bc7a4a454aa4cacc7f5c8df9745f31abc43eb41ecc461214adf4c2c86ce8d9b236185d999f91777b8e1e3b6fd471a9", 0x49, 0x8) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x3954450, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:56 executing program 0: shmget(0x1, 0x2000, 0x100, &(0x7f0000fd3000/0x2000)=nil) shmget$private(0x0, 0x2000, 0x1000, &(0x7f0000de4000/0x2000)=nil) r0 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r0, &(0x7f0000ffb000/0x4000)=nil, 0x4000) shmat(r0, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(r0, &(0x7f0000ff2000/0x3000)=nil, 0x8000) shmat(r0, &(0x7f0000ff2000/0x2000)=nil, 0x3000) r1 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r1, &(0x7f0000ffb000/0x4000)=nil, 0x4000) shmat(r1, &(0x7f0000ffd000/0x2000)=nil, 0x7000) shmat(r1, &(0x7f0000ff2000/0x3000)=nil, 0x8000) shmat(r1, &(0x7f0000ff2000/0x2000)=nil, 0x3000) r2 = shmget$private(0x0, 0x3000, 0x0, &(0x7f0000ffb000/0x3000)=nil) shmat(r2, &(0x7f0000ffb000/0x4000)=nil, 0x4000) shmctl$SHM_UNLOCK(0xffffffffffffffff, 0xc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) r4 = shmget$private(0x0, 0x400000, 0x8, &(0x7f0000bfd000/0x400000)=nil) shmat(r4, &(0x7f0000c02000/0x2000)=nil, 0x2000) [ 756.266316] FAULT_INJECTION: forcing a failure. [ 756.266316] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 756.267295] CPU: 1 PID: 7046 Comm: syz-executor.3 Not tainted 5.19.0-rc4-next-20220701 #1 [ 756.268025] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 756.268964] Call Trace: [ 756.269238] [ 756.269415] dump_stack_lvl+0x8b/0xb3 [ 756.269723] should_fail.cold+0x5/0xa [ 756.270023] _copy_to_user+0x2a/0x140 [ 756.270403] simple_read_from_buffer+0xcc/0x160 [ 756.270885] proc_fail_nth_read+0x194/0x220 [ 756.271313] ? proc_sessionid_read+0x220/0x220 [ 756.271758] ? security_file_permission+0xb1/0xd0 [ 756.272264] ? proc_sessionid_read+0x220/0x220 [ 756.272607] vfs_read+0x1ea/0x5d0 [ 756.272885] ksys_read+0x127/0x250 [ 756.273160] ? __ia32_sys_pwrite64+0x220/0x220 [ 756.273506] ? syscall_enter_from_user_mode+0x1d/0x50 [ 756.273895] ? syscall_enter_from_user_mode+0x1d/0x50 [ 756.274286] do_syscall_64+0x3b/0x90 [ 756.274572] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 756.274971] RIP: 0033:0x7fc5e327069c [ 756.275254] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 756.276582] RSP: 002b:00007fc5e0833170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 756.277145] RAX: ffffffffffffffda RBX: 0000000000000010 RCX: 00007fc5e327069c [ 756.277667] RDX: 000000000000000f RSI: 00007fc5e08331e0 RDI: 0000000000000005 [ 756.278195] RBP: 00007fc5e08331d0 R08: 0000000000000000 R09: 0000000000000000 [ 756.278888] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 756.279473] R13: 00007ffddbf7f9df R14: 00007fc5e0833300 R15: 0000000000022000 [ 756.280017] 20:28:56 executing program 2: ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000140)) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000006c0)=[{{&(0x7f00000001c0)=@abs, 0x6e, &(0x7f0000000540)=[{&(0x7f0000000000)=""/24, 0x18}, {&(0x7f0000000240)=""/165, 0xa5}, {&(0x7f0000000300)=""/92, 0x5c}, {&(0x7f0000000380)=""/251, 0xfb}, {&(0x7f0000000480)=""/187, 0xbb}, {&(0x7f0000000f40)=""/4088, 0xff8}], 0x6, &(0x7f00000005c0)=[@cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @cred={{0x1c}}, @rights={{0x10}}, @cred={{0x1c}}, @cred={{0x1c}}], 0xd0}}], 0x1, 0x100, 0x0) r1 = syz_open_procfs(r0, &(0x7f0000000180)='oom_score\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') recvmsg$unix(r1, &(0x7f0000000cc0)={&(0x7f00000007c0)=@abs, 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000840)=""/213, 0xd5}, {&(0x7f0000000940)=""/234, 0xea}, {&(0x7f0000000a40)=""/3, 0x3}, {&(0x7f0000000a80)=""/115, 0x73}, {&(0x7f0000000b00)=""/84, 0x54}, {&(0x7f0000000b80)}], 0x6, &(0x7f0000000c40)=[@rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x50}, 0x101) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000740)={0x3, 0x80, 0x1f, 0x8, 0x9, 0x80, 0x0, 0x3f, 0x202, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x1, @perf_bp={&(0x7f0000000700)}, 0x42000, 0x4, 0x20, 0x4, 0x8001, 0x7, 0x5, 0x0, 0x0, 0x0, 0x79ed}, r3, 0xffffffffffffffff, r4, 0x1) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) read$hiddev(r2, &(0x7f0000000040)=""/157, 0x59c0a33) 20:28:56 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:28:56 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:28:56 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:28:56 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:56 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:28:56 executing program 0: perf_event_open(0x0, 0x0, 0xd, 0xffffffffffffffff, 0x8) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:56 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0/file0/file0\x00', 0x1, 0xffffffffffffff83, 0x0, 0x840040, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:28:56 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8901, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:28:56 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:28:56 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:29:07 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8902, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x10) 20:29:07 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:29:07 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) fcntl$getownex(0xffffffffffffffff, 0x10, &(0x7f0000000000)) 20:29:07 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:29:07 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") preadv(r2, &(0x7f0000000300)=[{&(0x7f0000000140)=""/99, 0x63}, {&(0x7f0000000000)=""/35, 0x23}, {&(0x7f00000001c0)=""/136, 0x88}, {&(0x7f0000000280)=""/83, 0x53}, {&(0x7f0000000f40)=""/4096, 0x1000}], 0x5, 0x8, 0x5) 20:29:07 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0), 0x8, 0x0) 20:29:07 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:08 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:08 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:29:08 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:29:08 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:29:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x7ffffffff000) 20:29:08 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8903, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:08 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x3, 0xffffffffffffffff, 0x1) r1 = gettid() capset(&(0x7f0000000700)={0x20080522, r1}, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') mmap$perf(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x200000e, 0x100010, r2, 0x1f) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_bt_hci(r2, 0x400448e3, &(0x7f0000000f40)="e35fb951b19bb0116d19357e4cb35439d033842e03d3f689a5606bb384a5f94e03d682ee07cc9ae6c88795b7218be489112425fe30de0918ca54337f2a529db6450ab82fc09f92a08f997f0da5875f3df9714b3b6915b914b2b092f3f7c5309827a8045c17699cf896e51090064982825f067d6348986353de514e05d4bc870af52cc295ed9e7879b4aef83493b9ebd361d300e278b3dc12d3ca682ae96ad2211c64e1066b9cc12e0ec0f9612030ae695f18b8e342e5855abc1258730b6b0d74aff88b0b7be27b9eb3d67b0fd7e4b7fe8245bbf88e0d671326a2e45678edf053418598f85ff67c07650ea63905561b30e3b7bd49f9ad88202794b76d8edc3486d9c048de71fe2ea6fd81b35b7b3b92e62212e568d778506e60307768e0ced955884a461e6758c4acd818cd5a33167fc41370d6e14d890c77d501dc6eb18950008e946c02a70905d2fa9984a141f47b0998377e8aff0f1857b16ccd61eb21b0ab04f221cdeb537830c6a9d12fe9b2724d3af1344848d6622e756a58ff11825b20de13cd41c096151a4e85681c0a66d69c1d81bfa063050d74cbd6addf0675e551a86679ef6e015fd23c3fe0149991d855cbb27ca8e2f3ade9682aafa8af4723174d85408edb8722c3aa47c259e63891a87f94ccec4103ce89ac72698a6aee3d9b28342e448cda06c4ea0b6abb463119c694066c8ec5989f871dbbc67c602f533f0d2410095ab09e7f65db2ce4b2052954badc5ec1fc9d14f6185550ea4f5f8ff67aa917974a448a4298fa85e5cf270fdf1c6e773e1ac40152a862b6e0ef8176daf9fecd7b226549556bd8a236e6b6de5ba8fa6b83c234d43e80a791d4c779c45e6852892f25b0208671e6eb1915405a80df892024a1e1dc1d90325c56d4e2017524bde03b14e3bc2bb50b21798bf50b6c440311fd20caafe06e8105926ea81c1ca6d5b07f40f5a69d0e4ae4536665b2dfc3f4a1e30528151182cf32d8dac92afffed00e94117feb44cf79bab6f231ca831ecae889273edb0115f94d96166e4286d5412ab98aba7d8237a4a6fc4455c19e6f2916a6f768ecda8e533654261853352a760cd82a86c6ae48161ce7ad0f99b257c60752efdf0a5a91be4e3850bf7ad84d45e7daa4773cc8cd936428ce065e113b35a1a5a4b258b1e47d50fed3bf7a5165b567d63496cb67614e9bbb360bb25a91b748c628aa8670ea224630131a3cb71cf0d8dd82f1dad2bf34020d10595fe6714eba60a8761e80b6e84fcbe8ef96e2cb25a7877c658eb4365e8d906d53a714e6fa9f2dc4215a912c9179d302dbf59a01b105b907269da979f3224687eab2b5532560af8e594d5809dbaccf741711b7d1e4c28d367d59dcbb54fe1c8b4d1765f03218576a74ad61ae2779cc384d51a896eb0ca91f3d5929867d1557fded0a600894e28dbf982f4859e584ad722aa76905e91885a7563a29196f68d0e6fe6e1fe8a71eefccd8702fd8f7bfcb2ed026e6389754e3da12a3b5a254183571e268f96d193129de7200e93a361dce160ca28645697a2d80ab7643bd4f389730ec860f57d2432c6fd41de82227cbfbeb8a4abf7fa2c0a277c729ec4c1607f8363c6ff7947bb2d57a96e8f327101f516c9f50d99089e605a532b8b67b3bcd1ef2f8ceb2514264c14b7eb83617ec3f7d11e32ea113b376c1920e76c569cec85f89e1379d946d34c8eddb641e500bc8eabf4b491a07dd54865fafdfbe3ef4f5c210ce97f140f109636e129aea0f17aad2ff8cc23b22d06e2d3b279f636ccfa104c144ba96aba8e82d73cf1dc8ab8b0f84ff1909b035b813238366353d933d38ea1225096b5ea6cc1daebd68bdf94b47439910fd6ceff73b306fb81c3fa893adb1fdf95344b120207b21b513b8afefeb2ea3b4693d3a97d3bce45bf4388ee0336224d8ab11af5c1071966d860596f3a35fb08322b08564aa6eb3368365ff3e0e780a843da28587f5af828222bbaa9a4f57b7b015bd3c7c55564db75fb5868b38ed58cab08b0f312e8ab7fde49d33cc39a0de6d493467b919995717e51985b2a87689c33dc0595c7a9f6b187e60e8afffdb7ac699548e6d4ab6b9c7ad23535318d8441f32ba69c23dfcfc7d3095a68dc0ddb1a6b16217e77886c9fdc7d0499ca71726a7a1a936c2fe324e95b8cbf5e6a3a4dfb7dfbb47b161ef53117897bbced2966fb2ce5dd59667a27cd0be3f193f0dac0124dcdb502034029b079a2311f768d290b175ee9e074ea6a41c19cb67225fe6fe4fa1ea2fbec940b97bdf9935c447e81bad1471d11c25925513a44e1d128ea68ccc42b0fac8e2b8c8d0979f74ffc3895d1ea20a57a454764623655b5dbe093d49316b7539da6acfc22537c510c2d0c0391fa982d76ea633c84da099eca45a4ffafb51f6f5895faf362e40a1ed6c63698d657da106aae5886e7500084150ad9300d483bd6219fff1669504cb77efa83517eabe2dcf4043c54da1bad43472a5847794f9c2434fc7e22fb534abd174acb3d5805803a57ba9c4058134debc881ab8fb5448b55cac839041c45b229abd462d85175474287b794ecbb72fc9a284b892e2b8ccd53a2a1cc7515b8ffc330e011d7b99151dcd5983a31535f2aa3bbbca675f53ec98bf0c3589cd4480869b0826202bb9e54d9218ec3d0fd6438b2544494701245e4929e53fa9f98a51378c55fca0cc9537a057c6e69176308d90ebbc425d9a5b8a920193d5c32e63630eee0b7007369d761d965a568b85d5dde6b4fbf07374a25de41aaa2a8a8ebc862f7a20067f27a60c015306fbf61cbc33d79590cb13edaf150306b01899bef1dbff4650c9b8183d76094458c981738851af66c6465fe52ca7faa92496907dac5741606c60fe4f281f09f472da7fdf145268770b158b201fb4bfbcbe1401dbeb9bb99065ffa37c3815a111d74befa9bf2543d19a98c0f31e6be3e27332321678db821dba5cfcb1147336987827184581f1368af3ecb3c32cfc2d0545e04ca0dd053b47e2d2f00e01fc225abd3f831f850f756d3eac06d70b742dfef3083f4f886dff5af7dbb8f9d08234df9188bc7ab7ca6a779a02fec5a97187c08bc9819910549f87538ed20f0f4a299a503979df482fca304ef26f56d787a5dc609b0f07656f12abfce30c2188132e01403d7f9d320ba34108c6924b695606c936bec3c6b35ba8d6591a293290b96da75a275fbc244c39be508d12ea84b3afe3ae278ba6ab4d61723686807f8faf7e694f575ede1e4543e6bbbc5af9a01f1592542110ae20b63fd5db75a2f09ec0ba6aa2468377dcf3dd0a3ef9ff77fff578bb10c9b284ae8b9c3279cfb0aab24c3a2425387fd4d14d0ff5c23fd491abd6b786605a57ce792dc2aa37a7c2331c30a1a8af0ae5ced4bcc2c4619bcd4557b659cfdd4e80487aa8aa32b36b321d2c7f9da87742d3f77e520f83128abd71c6a6bc5efc58d91709b3fd7979b77d98dbc63ee1442edfb68bba8f5a52bbee25fba70936cfda07bd5fcfcad3576f1d283c241abec89daae64af09457f543e5307fd23d1441e9360aef6a97f93da99328830aaecdb0c734f45443476418b7b485bc22bb007d1d56c31f323b442e57c4af60a2490a3a3aad618392025d63a9fb22dc73c92993d9e61b644dc063ed3ae40106a1721b8e4a3dcde2f74cd0a1ef635106a1c76b823b057452db392dd3f7123ded0839d085913c3ad65df16379d9b4dd52acf55fbbb5b52c2b13ad7c55c18efcb1b4cb2a60df3a6b20e2a4cebfc2c7e2e8dbed5fbdb0e6d06a8e4d28c30417065bf9c7301bccf8406dbe7944cb735f5189106110dba9584bd3016fcadf0f3cd2e5fc3e3486159e5b083f3ef1662c7baa9408cc83c291cfbcbcc702712d42caef221e01c77552f98dcdd53c08805d46299d69220ec608ed3353494a8c33ae3db5b3b4b2ce9cfd63edd559e231fb3c6e3c990bcb3a9631604548f4cb9bf3ebc6c3cfe6bc0b3af6fd9ff3e9638a369eae9b36067ea9a5494112d0963eff406fcb84360b74096713771927078ec82a7f864e570c6ba9da5110f1298acda5ebca21f30b73492193e2f729c18b9a8abbe5e297f09dece8f81138e88837d027e9f959448cd11545b71a94d3726ef96939b0bb2f1cc6471f4c718d5a215fb77f4361b365a3a2458fa64027c2c347988c21c37b17fcd3b5d8f9cd51a6cb0af1f3147c1e119dc33486495b7e2a99e3f73209b4a0e7a99d829e8fdde31888cbea7598296098db35b17b8ea75fa3797f8b630dfb8822a57beddf16f69a74357808ef74b27b73a83a129a509aff6b8563cd5d16f020035b6f13af2775146ca1d2d35be979d44903d7ed0f6876e8eb00d74e1d57e111c26bd91c8ce641b45d6ebdbdbaf954c6eac051c44747502f8b0364ed344226a04b56731fb5f29d1e6684be01cc71bda8095805da1b700f45653570efe65d9f50de16c774c63fe9a6175bfdd0c9e27f9542393aa72722a572bc7b8b9533d1e51c36b756fba91f9d36f82032d2e6a31db1c1d18fe2d5698a3e6f526d30596ea6b3b9076a0ec8caabb47a9efd756b833301692036a33b6a36082704bd6d6acdc95971be9323f03cfe87a93d46604cf398b1529b74c7e37eca4803fa2d99a938600b4873c8956e2c7477ca31c6a84f672401e31c6dab08ac0e370732afbdd463d40304840a4bed44a9e6d36df42ead6d53c3050099a499c4c5d11dacdfc4398865246852d05bafa03832a5b302497b6021d033e06ca192dedfce8233aac63d183f7d6354e35f8b4f348383d54df120e280db53ff0941bbb3568bf3c066effc08e0fa4115233f714dd1548e59000ce2d224631fc4d3d2aebd3c889901bf870667901bcc48b8e44d7063b84252ba8ad5a29c6952412c5f62bd97b75d00aefafc66296b09ce3d38bc267a7b67fa1f131b24909abf2d508ba1abc2d476063887305165caf1060d1e9c4ca21e915fd4e45764260de642d4d8da0ad0d2f91836af99fdaec8cd18e29313540c256a63b2acdd0bebc6aeebb9573baf54373b11ca52c913e33cfeb6d146a5d6fdb5031223a2d15081e5a0c8b8919548c2d37fb6642638610e3a6ca283383476a7dd59e996555d62e8fdff9e034be95600dbac253e665776e84475aece4bb789795404fb3b9a3bef94b3269e667daf254ea009e7a2ab0811028337c212b86931c8c22dc693c1d976dd2afe180233a8e735bd5566a81e63c3e3e6cef9e15fb9ef729af757be7a805b2d7bdb1d0cff2b9da0eebba740eecdfb43e8c0c561e25200dcfe3b1b017a6cba0e33c30fa858a9cb6ce0b0d7e90670bb746eb086a116ca8b52da3073d6016ab0e6a8042cad344041bf5e9a1cf408b63c815cc53c3d7df87840c9f32beb1d53b6ae709a5cfab7fd9d927b77d7930b1b84bea5cd18f98222e764ced5398736d6fd144c5c355a0cb0dbde25b9c07f8e6f9aa9f2a434eba8cd94d06c10c617b11ad01260d5e06a66b6febfabd88783408dbe6d3171c73471775ececa0d72cd8ecd7b78cc60e35ad7f8c6c08186b3b80ffd0ff3983730ea54c1590b220efd1550185bd50884d067ab7d2e03e56f0d8bcd493e9a467cce74b1d3e01ada7058af247e849316c73b9a733e99bef4cda21dfc93c0d991cfbf7c974e602124c4099861d04dd796e7c9071d95a88bcfbea10bfe834db44f48e74f19a57a20fa3ab1e3cbd8951e933383594fd30714ebdbf0fadd68facbb2f0bd10faa5a3fa01b154a7caab53a5d39df19ba03b8f309dc9a126e7837d22b73ed794b7de7718fa7697eaaf2fab1e7ed21ea49b2de5bcdad50dc0b8873cc805526953f6") perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x81, 0x7, 0x40, 0x4, 0x0, 0xffff, 0x108, 0xc, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x4, 0x1, @perf_config_ext={0x101, 0x3}, 0x18041, 0x5, 0x0, 0x5, 0x7f, 0x5, 0x400, 0x0, 0x0, 0x0, 0x6}, r1, 0x10, r2, 0x9) timer_create(0x6, &(0x7f00000002c0)={0x0, 0x21, 0x4, @thr={&(0x7f0000000180)="6224559c443a29a4a6cccd806927efa4e2b93e09171368059f0aee458b6653cde3e3f213e4ca291fb87505b9f3d6603cc8e0c2f55425a118d177bda7e6bd355451469f42e8b9bc6308029356b9e0247c89ad27cff518e3af9c620dff86ca4b6a1aacca4c9e38d8138498242bf4a5a32dc1c5881f9c2deca5a08c5acd0c7636c3272d8b06ba6787e219c0efb9255bc6ffa2bf6f84bdd6741899345c6d9d993d1fc26c0ea112fe7924bc13ddce90b8b01a3d41f1c9a0ea7600ab90bc08f0d6308f2a48c6d96e91452093e168f18da04184a6f4f464b5e30b695a864061f4dba2e99974a3ca1a13", &(0x7f0000000280)="c8fd62d85608de6a5d729e0e09b708aec31a2ee12770885b85a614b0b9bc247f890c0080d21131fd80a9bb80abaf684386e3835c885d9c084708674bc26a"}}, &(0x7f0000000300)) sendfile(r0, r2, &(0x7f0000000000)=0x1f, 0x1) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000340)={0x1, 0x80, 0x2, 0x2, 0x1, 0x2, 0x0, 0x9, 0x40, 0xa, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x5, 0x0, @perf_config_ext={0x4c7, 0x1}, 0x100, 0x4, 0x1, 0x9, 0x0, 0x400, 0x7ff, 0x0, 0xfffffff8, 0x0, 0xe2}, r1, 0x10, r2, 0x8) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:08 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:29:08 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:29:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = syz_open_dev$vcsa(&(0x7f0000000000), 0x6, 0x8001) r2 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r1, 0x40182103, &(0x7f0000000100)={0x0, 0x3, r2, 0x6, 0x80000}) 20:29:08 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = mmap$IORING_OFF_CQ_RING(&(0x7f0000ffb000/0x4000)=nil, 0x4000, 0x0, 0x40010, 0xffffffffffffffff, 0x8000000) r4 = syz_init_net_socket$802154_raw(0x24, 0x3, 0x0) syz_io_uring_submit(r3, 0x0, &(0x7f0000002440)=@IORING_OP_ACCEPT={0xd, 0x0, 0x0, r4, &(0x7f0000002400), 0x0, 0x0, 0x0, 0x1}, 0x6) r5 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) r6 = syz_io_uring_setup(0x28a3, &(0x7f0000000080), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_register$IORING_REGISTER_PERSONALITY(r6, 0x9, 0x0, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r5, 0x9, 0x0, 0x0) io_uring_register$IORING_UNREGISTER_PERSONALITY(r6, 0xa, 0x0, r7) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000200)=@IORING_OP_ASYNC_CANCEL={0xe, 0x4, 0x0, 0x0, 0x0, 0x12345, 0x0, 0x0, 0x1, {0x0, r7}}, 0xf05) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000240)=ANY=[@ANYRES64=0x0, @ANYBLOB="360f000000000040060000000000000001293deac613eb6654db336b75a6a4ee290000000000000001000080000000000100000000000000070000000000000095030000070f000003000000ff0300000000000000000000000000e7140000004300000000000000ff7f000000000000280000000000000000000000000000a33a9aeb325c108ce93ddfbeb75d02a7c000"/166]) ioctl$BTRFS_IOC_INO_LOOKUP(r2, 0xd0009412, &(0x7f0000000f40)={r8}) 20:29:08 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8904, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0xa) r2 = syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r4, 0xc018937a, &(0x7f0000000140)={{0x1, 0x1, 0x18, r2, {0x800}}, './file0\x00'}) 20:29:19 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:19 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8906, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:19 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:29:19 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f1"}, 0x73, 0x0) 20:29:19 executing program 0: r0 = gettid() capset(&(0x7f0000000700)={0x20080522, r0}, 0x0) perf_event_open(0x0, r0, 0x4, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000100)='attr/exec\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:19 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:29:19 executing program 3: ioctl$CDROM_SELECT_SPEED(0xffffffffffffffff, 0x5322, 0x2) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x8001, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000}, 0x0, 0xe, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='wchan\x00') r1 = fork() perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x2, 0x0, 0x9, 0x51, 0x0, 0x6000000000000000, 0xff2b9f42bf52d671, 0xc, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1ff, 0x1, @perf_bp={&(0x7f0000000000), 0x4}, 0x100, 0x6, 0x4, 0x4, 0x5, 0x0, 0x2, 0x0, 0x10000, 0x0, 0x5}, r1, 0xc, r0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:19 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000100)='fd/3\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:19 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_aout(0xffffffffffffffff, &(0x7f0000000140)={{0x10b, 0x7f, 0x0, 0x3c7, 0x0, 0x3, 0x24b, 0x7}, "89b122096cf2d934026b73f0defc6f2afdef5e425565056075b6ec190e9dff3047deeb298318d4e364f3982281fd509d62b162e2f8104bdc99ff8255e24f018e4d20cf74298343366ba721a5aac3f04e9c1463b0664c243f239c1e1ded33464e7f7096f5945731c8c6e1a036c8dc5449efd6774ec5e84866a05ca6c92533e04bcb685d2cb8a569", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0xaa7) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r0, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) renameat(r2, &(0x7f0000000c00)='./file0\x00', r3, &(0x7f0000000c40)='./file0\x00') r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) mknodat$loop(r5, &(0x7f0000000c80)='./file0/file0\x00', 0x1100, 0x0) 20:29:19 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:29:19 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:32 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:29:32 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8907, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:32 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x400000, 0x0, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x101, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = gettid() capset(&(0x7f0000000700)={0x20080522, r1}, 0x0) r2 = openat(r0, &(0x7f0000000180)='./file0\x00', 0x2000, 0x80) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") write$binfmt_aout(r3, &(0x7f00000001c0)={{0xcc, 0x6, 0xc7, 0x11d, 0x69, 0x5, 0x24a, 0x80000001}, "9c6abd9a9b1e559d25e8c94f72fe41066a991834e2120c15"}, 0x38) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x5, 0x8, 0x5, 0x9, 0x0, 0x0, 0x8550d727cd958205, 0xe, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xfffffffd, 0x5, @perf_bp, 0x41021, 0x9aa, 0x3, 0x0, 0x5, 0x81, 0x8000, 0x0, 0x100, 0x0, 0x9}, r1, 0xe, r2, 0x1) 20:29:32 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xfb, 0x7, 0x3f, 0x9, 0x0, 0xffffffffffff0000, 0x8714, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x80000000, 0x3}, 0x4000, 0x89bb, 0xfffffffa, 0x2, 0x7, 0x7, 0x7, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xc, r1, 0x12) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:32 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) write$binfmt_aout(r1, &(0x7f0000000340)=ANY=[@ANYBLOB="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"], 0x13b) 20:29:32 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:29:32 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:32 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:29:32 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = fsmount(r0, 0x1, 0x70) ioctl$TIOCGPGRP(r1, 0x540f, &(0x7f00000001c0)=0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x7, 0xff, 0x4, 0x8, 0x0, 0x4, 0x210, 0x8, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x2, @perf_bp={&(0x7f0000000100), 0x8}, 0x2108, 0x6, 0x5, 0x0, 0x80000000, 0x20, 0x5, 0x0, 0x5, 0x0, 0x36af}, r2, 0xf, r3, 0x4) sendfile(r1, r0, &(0x7f0000000000)=0x7, 0x101) 20:29:32 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:29:46 executing program 0: ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, &(0x7f0000000200)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32, @ANYBLOB="0000001d000000002e2f66696c6530005fb33a54de3e4055d1c8fbb355d5582c4eacefdb87adcb7ddd3a4453cce75f29fbd291915649c332ad2014e3375b04ce79c7ec096ab7ed97e24d9c2706578fa47de0a4f7196ea14dfe0c2124139324abc40d9afe3e302824fefe163c9ac102477c4bcfdecc1641c6154b8b33d6d83c889941eb779b63947c926f8a88816a0c686058605bdfce7f8d1fca66d3c937eccedb36eff70bcf245095b314ad96380bfb2915d21b17aa919767bd110728340295c5df"]) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:46 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:29:46 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') signalfd(r0, &(0x7f0000000000)={[0xb2]}, 0x8) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:46 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:46 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:29:46 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x890b, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:46 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x47c2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xc}}, 0xffffffffffffffff, 0x3, r0, 0x3) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = getpgrp(0x0) perf_event_open(&(0x7f0000000180)={0x3, 0x80, 0x7b, 0x80, 0x8, 0x2, 0x0, 0xfffffffffffffff9, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x37, 0x1, @perf_bp={&(0x7f0000000140), 0x1}, 0x10110, 0x1ff, 0xfffffffb, 0x1, 0x62d07ff3, 0x80, 0x1, 0x0, 0x8b73, 0x0, 0xffffffffffffffc0}, r3, 0x0, 0xffffffffffffffff, 0x2) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") splice(r1, &(0x7f0000000000)=0x5, r2, &(0x7f0000000100)=0x1000, 0x400, 0x0) 20:29:46 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xfb, 0x7, 0x3f, 0x9, 0x0, 0xffffffffffff0000, 0x8714, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x80000000, 0x3}, 0x4000, 0x89bb, 0xfffffffa, 0x2, 0x7, 0x7, 0x7, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xc, r1, 0x12) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:46 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xfb, 0x7, 0x3f, 0x9, 0x0, 0xffffffffffff0000, 0x8714, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x80000000, 0x3}, 0x4000, 0x89bb, 0xfffffffa, 0x2, 0x7, 0x7, 0x7, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xc, r1, 0x12) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:47 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x20, 0x8, 0x0, 0x7f, 0x0, 0x5, 0x100, 0x8, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfffff38d, 0x4, @perf_bp={&(0x7f0000000000), 0x9}, 0x101, 0x9, 0x8001, 0x2, 0x1, 0x400, 0xfffe, 0x0, 0x81, 0x0, 0xffffffffffffff3d}, 0x0, 0xffffffffffffffff, r0, 0x2) 20:29:47 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:29:47 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78"}, 0xa9, 0x0) 20:29:47 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:47 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x890c, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:47 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xfb, 0x7, 0x3f, 0x9, 0x0, 0xffffffffffff0000, 0x8714, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x80000000, 0x3}, 0x4000, 0x89bb, 0xfffffffa, 0x2, 0x7, 0x7, 0x7, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xc, r1, 0x12) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:29:47 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:29:47 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:29:47 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:29:47 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000100)={0x3, 0x80, 0x3f, 0x6, 0x7, 0x0, 0x0, 0xd5a6, 0x1000, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x3, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x80000000, 0x1, @perf_config_ext={0x2, 0x400}, 0x100, 0x1f, 0x1, 0x7, 0x2e, 0x5, 0x401, 0x0, 0x10000, 0x0, 0x8}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0xa) 20:29:47 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8910, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:29:47 executing program 3: getrusage(0xffffffffffffffff, &(0x7f0000000100)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) wait4(0x0, &(0x7f0000000000), 0x9, 0x0) openat(0xffffffffffffffff, &(0x7f00000001c0)='./file0\x00', 0x0, 0xe8) 20:30:01 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8911, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:30:01 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xfb, 0x7, 0x3f, 0x9, 0x0, 0xffffffffffff0000, 0x8714, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x80000000, 0x3}, 0x4000, 0x89bb, 0xfffffffa, 0x2, 0x7, 0x7, 0x7, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xc, r1, 0x12) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') 20:30:01 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) open_by_handle_at(r0, &(0x7f0000000000)=@xfs={0x1c, 0x81, {0x8000, 0xd12, 0x4, 0x401}}, 0x660002) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:01 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f00000001c0)={0x2, 0x80, 0x0, 0x3, 0x2, 0x2, 0x0, 0x7f, 0x80100, 0xc, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1f, 0x1, @perf_bp={&(0x7f0000000180), 0xf}, 0x3202, 0x0, 0x4, 0x0, 0x7f, 0x6, 0x2, 0x0, 0x9, 0x0, 0x9}, 0x0, 0x7, 0xffffffffffffffff, 0x11) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x1, 0x7, 0x7c, 0x3, 0x0, 0x94e, 0x60100, 0x3, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x7, 0x4, @perf_bp={&(0x7f0000000000), 0x2}, 0x832c, 0x1b, 0xf800000, 0x0, 0x4, 0x4, 0x7, 0x0, 0x1, 0x0, 0x1}, 0x0, 0xc, r0, 0x1) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:01 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:30:01 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:30:01 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:30:01 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") sendfile(r2, r0, &(0x7f0000000240)=0x200, 0xffffffff) r3 = dup2(r0, r1) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000000600)=ANY=[@ANYRES64, @ANYBLOB="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"]) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000055040)={0x6, [], 0x3, "bc386eff17b8c9"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000005f2c0)={0x3583ca83, [], 0x2b, "b522b13a4fdf6c"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000006a900)={0x2, [], 0x3, "ad0b44c11a4d40"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000005e640)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r2, 0xd000943d, &(0x7f000005e840)={0x6, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}], 0x3f, "b2e51f60f38699"}) r5 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r3, 0xc018937c, &(0x7f0000000200)={{0x1, 0x1, 0x18, r1, {0x2}}, './file0\x00'}) ioctl$PERF_EVENT_IOC_ENABLE(r6, 0x2400, 0x1) read$hiddev(0xffffffffffffffff, &(0x7f0000000140)=""/169, 0xa9) pwritev2(r5, &(0x7f0000000280), 0x0, 0x3, 0x8, 0x9) 20:30:01 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) r2 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r2, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0xfb, 0x7, 0x3f, 0x9, 0x0, 0xffffffffffff0000, 0x8714, 0x7, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x400, 0x1, @perf_config_ext={0x80000000, 0x3}, 0x4000, 0x89bb, 0xfffffffa, 0x2, 0x7, 0x7, 0x7, 0x0, 0x1, 0x0, 0x4}, 0x0, 0xc, r1, 0x12) 20:30:01 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x4}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:02 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:30:02 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:30:02 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) 20:30:02 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x2) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1, 0x12, r0, 0x0) ioctl$DVD_AUTH(r1, 0x5390, &(0x7f0000000000)=@hsc={0x1, 0x2, "20c3f0c4fc540593a3f7"}) 20:30:02 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) r1 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r1, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) [ 821.672311] audit: type=1400 audit(1656880202.143:16): avc: denied { map } for pid=8415 comm="syz-executor.0" path="/proc/8415/wchan" dev="proc" ino=22036 scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=file permissive=1 20:30:14 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r2 = gettid() r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_TIMEOUT(r3, 0xc018937a, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r4, {0x5}}, './file0\x00'}) capset(&(0x7f0000000700)={0x20080522, r2}, 0x0) perf_event_open(&(0x7f0000000140)={0x5, 0x80, 0x4, 0x1, 0xff, 0xfb, 0x0, 0x7, 0x40, 0xc, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x2, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x5}, 0x1045, 0x1, 0x2, 0x4, 0x2, 0x8, 0x6, 0x0, 0x7ff, 0x0, 0x8001}, r2, 0xd, r1, 0x9) read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:14 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = dup3(r0, r0, 0x0) mmap$perf(&(0x7f00007fe000/0x800000)=nil, 0x800000, 0x3000001, 0x10, r1, 0x8) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xa}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty, 0x1}, 0x6c) socket$packet(0x11, 0x2, 0x300) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) sendmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x0, 0x10) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:14 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:30:14 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8912, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:30:14 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:30:14 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:14 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:30:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x40825, 0x9d8, 0x0, 0x0, 0x2}, 0x0, 0xa, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$HIDIOCSUSAGES(r0, 0x501c4814, &(0x7f0000000f40)={{0x3, 0x2, 0x8, 0xfff, 0x8b, 0x63}, 0x3ce, [0x10001, 0x80000001, 0x49ee, 0x0, 0x80000001, 0x9, 0x3, 0x2, 0x8, 0x2, 0x9, 0x8001, 0x0, 0x7, 0x6912a718, 0xffff, 0x5, 0x7, 0x2, 0x2, 0xffff, 0x6, 0x6, 0x2, 0x1, 0x8000, 0xffffffff, 0x0, 0x9, 0x4, 0xf1a7, 0x0, 0x2, 0x4, 0x1, 0x1, 0x89d, 0xfffff000, 0x2, 0x1, 0xa48c, 0x3, 0x1, 0x7f, 0xf91, 0x6, 0x1, 0x46, 0x1, 0x9, 0x9, 0x10000, 0x14c, 0xffffffff, 0x400, 0x8, 0x2, 0x2, 0x3f, 0x3ff, 0x8f, 0x9, 0x0, 0x9, 0x0, 0x1, 0x58dc, 0x7, 0xac7e, 0x2, 0x0, 0x4, 0x1ff, 0x1ff, 0x0, 0x81, 0x6, 0x5, 0x4, 0x800, 0xd5e0, 0x3, 0x3, 0x5, 0x9, 0x48d3, 0x9, 0x2, 0xa8a, 0x40, 0x1, 0x100, 0x7, 0x4, 0x2, 0x9, 0x3, 0x214, 0x6, 0x101, 0x9, 0x0, 0x3, 0x4, 0x8000, 0x8001, 0x6, 0x1000, 0x7ff, 0x9, 0x6, 0x400, 0x63, 0xffff, 0x3, 0x9, 0x7fb, 0x54e, 0x9, 0x1, 0x7fffffff, 0x400000, 0x303, 0x84, 0x0, 0x800, 0x7f, 0x4, 0xd7dc, 0x2, 0x8, 0x9, 0x0, 0x7, 0x6, 0x3, 0x3f, 0x7, 0xffffffff, 0x401, 0x3ff, 0x7, 0x175, 0x6, 0xffffffff, 0x2, 0x20, 0xffff, 0x2, 0x1, 0x6, 0x43b, 0x3, 0x87, 0x6, 0x37, 0x7, 0x10000, 0xffff, 0x65cb54d9, 0xfff, 0x0, 0x0, 0x9, 0xff, 0x7, 0x6, 0xddb6, 0x4fb, 0x2, 0x6, 0x483, 0x3, 0x3f, 0xfffffff8, 0x101, 0x1, 0x7f, 0x8, 0x1000, 0x80000001, 0xef46, 0x81, 0x7, 0x2, 0x22, 0x5, 0x4, 0xb4, 0x80000000, 0x3, 0x2, 0xffffffff, 0x7, 0xffffff81, 0xd2, 0x80000001, 0x7ff, 0x7, 0xffffffff, 0x9, 0x8, 0xffff, 0x7f, 0x7, 0x548, 0xffffffff, 0x25, 0x9, 0x7f, 0x2, 0xb118, 0x404eb3c6, 0x6, 0x0, 0xfffffffe, 0x8000, 0x6, 0x2cec, 0x29, 0x0, 0xc8c, 0x8001, 0x7, 0x7fed, 0x81, 0x5, 0xb90, 0x7, 0x7, 0x6, 0x8, 0x0, 0x80000000, 0x8, 0x9, 0x6, 0x0, 0x3, 0xd53, 0x0, 0x63, 0x10001, 0x8b, 0x32a29e2f, 0x40, 0x80000001, 0x4ff, 0x1, 0x0, 0x3f, 0xd, 0x0, 0x1, 0x5, 0xfffffffa, 0x6, 0x1, 0x2, 0x2, 0x9, 0x0, 0x8001, 0x10000, 0x1ff, 0x4, 0x5, 0x3a6f, 0x1, 0x1, 0xffffff80, 0x6, 0x9, 0x1000000, 0x7fffffff, 0x9, 0x1, 0x4a8, 0x5, 0x101, 0x0, 0x401, 0x5, 0x9868, 0x7ff, 0x3, 0x4, 0x1, 0x25, 0x400, 0x80000000, 0x8, 0xc0000000, 0xab5, 0xbab4, 0x200, 0x7, 0x119, 0x4000, 0x6, 0x6, 0x894, 0xfffffff7, 0x5, 0x3ff, 0x0, 0x40, 0x1, 0x4, 0x5, 0x869, 0x0, 0xff, 0x8, 0x8, 0x2, 0x9745, 0x101, 0x0, 0x400, 0x3, 0x4, 0x170, 0x302, 0x19, 0x5, 0x100, 0x5, 0x83e, 0x0, 0xfff, 0x400, 0x1, 0x81, 0x6, 0x9, 0x5, 0xffff, 0x8001, 0x400, 0x3, 0x7, 0x9b, 0x10001, 0x5, 0x8, 0x9b9, 0x9, 0x1, 0xfffffff7, 0x2, 0x3, 0xfd, 0x620b, 0x0, 0x9, 0x1, 0x4fda, 0x6, 0xaf6f, 0xc986, 0x7, 0x0, 0x9, 0xffffffff, 0x63a, 0x8, 0x81, 0x5, 0x9, 0x401, 0x6, 0x1, 0xc7, 0x7, 0xfffffffd, 0xf7a, 0x7, 0x2, 0x7, 0x9, 0x9, 0x4, 0x7fffffff, 0x3, 0xfffff800, 0x9d, 0x6, 0xa25e, 0x3, 0x400, 0x80000001, 0x10000, 0x500, 0x4, 0x3, 0x69c9, 0x40, 0x5, 0x7ff, 0x800, 0x1, 0x1, 0x1, 0xff5, 0x6, 0x9, 0x6, 0x845, 0x7fff, 0x8001, 0x80000001, 0x1, 0x3, 0x9f, 0x80, 0x900, 0x5, 0x6, 0xffffffff, 0xe2, 0x7a, 0x81, 0xcc, 0x2, 0x200, 0x5, 0x2, 0x200, 0x81, 0x0, 0x0, 0x6, 0x7ff, 0x5, 0x2d1, 0x3, 0x6, 0x1, 0x2, 0x800, 0x8, 0x4, 0x5, 0x3, 0x1985, 0x101, 0x4, 0x9, 0xfff, 0x1, 0xc5f2, 0x878, 0x4103, 0x9, 0x9, 0x1, 0x3, 0x3, 0x8, 0x2, 0x4, 0x0, 0x8000, 0x9, 0x0, 0xffff8001, 0x7410, 0x9, 0x0, 0x3, 0x5, 0x1000, 0x400, 0x4, 0x2, 0x100, 0x1, 0x7fff, 0x3f, 0x9, 0x7fffffff, 0x4, 0x7, 0x3f, 0x0, 0x1ff, 0x7ec5, 0x3f, 0x5, 0x12000, 0x5, 0x4, 0x46d, 0x5, 0x2, 0x2, 0x2, 0x5, 0x9, 0x3f, 0x7, 0x3, 0xfffff814, 0x200, 0x88f, 0x1, 0x38, 0x1715, 0x9, 0xfffffac6, 0x10, 0x10000, 0x6, 0x7, 0xffff, 0x230, 0x1, 0x688f, 0x4, 0x7fffffff, 0x7fff, 0x6, 0x7, 0x4, 0x100, 0x5, 0x9, 0x2, 0x2, 0x5, 0x5, 0x7f, 0x86, 0x6, 0x6, 0xffff, 0x3, 0xa6e, 0xe3f, 0x7, 0xd9, 0x7, 0x3, 0x9, 0x80000000, 0x91a7, 0x9, 0x4, 0x5, 0xb78d, 0xe5, 0x9563, 0x8, 0x3, 0x5, 0xffff5978, 0x72, 0x7, 0x71f9, 0xe7ba, 0x3, 0x10001, 0x8000, 0x3, 0x8, 0x9, 0x4f, 0x0, 0x0, 0x9, 0x6, 0x52, 0xc3, 0x7e, 0x4, 0x100, 0x40, 0x100, 0x0, 0x200, 0xcf, 0x8, 0x6a, 0xf31a, 0x20000, 0x9, 0x0, 0x7, 0xfffffffe, 0x8, 0xff8, 0x4, 0xe0d4, 0x5, 0x10001, 0x800, 0x1, 0x1000, 0x0, 0x6, 0x200, 0x69, 0x6, 0x6, 0x3, 0x3, 0x81, 0x0, 0xe8c0, 0x2, 0x3, 0x7, 0x80000001, 0x6, 0x40, 0x3, 0x1ff, 0x111, 0xe6, 0x0, 0xffff, 0x738, 0x152, 0x7, 0x65d7, 0x0, 0x4, 0x3ad3, 0x7f, 0x9, 0x80000001, 0x8, 0x2, 0x3, 0x7fff, 0x9, 0x3, 0x7fffffff, 0x1, 0x3, 0x1, 0x6, 0xfff, 0x2, 0x4, 0x6, 0x4, 0x60, 0x2, 0x101, 0x9, 0x20212219, 0x4d4, 0x7731, 0x1, 0x10001, 0x5, 0x7, 0x81, 0x3, 0xff, 0x2, 0x7f, 0x1, 0x0, 0xfff, 0x6, 0x1, 0x2, 0x751, 0x7ff, 0x591, 0x5, 0x6900, 0x3, 0x1, 0x8, 0xb3c, 0x59831933, 0xff, 0xffff0000, 0x9, 0x80, 0x1, 0x1, 0x7, 0xfff, 0x546, 0xffffffff, 0x0, 0x60d521ce, 0x5, 0xac10, 0x400, 0x6, 0x200, 0xf88, 0xa28, 0xbfd, 0x46, 0xffff5aff, 0x1, 0x1, 0xfffffffe, 0x81, 0xfffffffe, 0xfffffffc, 0x7, 0x8, 0x7, 0x100, 0xfffffffa, 0x50, 0x7ff0, 0x3, 0x953, 0x1fb5, 0x1ff, 0x7, 0xa5, 0x5, 0x180000, 0xb8, 0x401, 0x5, 0x8df3, 0x7, 0x8001, 0x1ff, 0x32, 0x4, 0x8, 0x74e, 0x80000000, 0x9, 0x80000001, 0x6, 0x3, 0xff, 0x1f, 0x2, 0x2, 0xb3, 0x7, 0x400, 0x9, 0xebd1, 0x1, 0x8, 0x533, 0x81, 0x3, 0x0, 0xa69, 0x8, 0x92256800, 0x3, 0x400, 0x4, 0x20, 0x1, 0x8, 0x4, 0x5, 0x7, 0x1170200, 0xffff, 0x91b, 0x0, 0x3, 0x9, 0x3ff, 0x4, 0xffffffff, 0x1, 0x80000001, 0x0, 0x33, 0x7a9, 0x7f, 0x9, 0x6, 0x57, 0x4, 0xbb4, 0x3, 0x0, 0x1, 0x1, 0x5, 0xffff, 0x637, 0x4, 0x0, 0x4, 0x4, 0x2, 0x8, 0x10000, 0xfffffffd, 0x200, 0x9, 0x8, 0x401, 0x8, 0x0, 0x1, 0xffffffe0, 0x0, 0x4fdb8b80, 0x20, 0x2b08aebe, 0x40, 0x8000, 0x10000000, 0xfa8, 0x1, 0x10000, 0x0, 0x1, 0xc47, 0x7, 0x3, 0x4, 0x5, 0x0, 0x6, 0x1f, 0x0, 0xfffffff8, 0xc8b, 0x1, 0x4, 0x32, 0x8, 0x9, 0x2, 0x2, 0x8, 0x9, 0x1a, 0x7ff, 0x6e, 0x3, 0x3f, 0x9, 0x9, 0x3, 0x5e800, 0x10001, 0x9, 0x9d8, 0x10001, 0x335, 0x100, 0x9, 0x200, 0x8, 0xffff0000, 0x9e, 0xc85, 0x8, 0x6, 0x2, 0x0, 0x7, 0x2, 0x2, 0x1, 0x9, 0xffffffff, 0x2, 0x2, 0x9, 0x10000, 0xfffffffb, 0x6, 0x1, 0x9, 0x7, 0xffff, 0x0, 0x56f, 0x6, 0x2fb, 0x1, 0x7ff, 0x2, 0x1, 0x8, 0x1, 0x40, 0x3, 0x7a59, 0x2, 0x4, 0x7f, 0x9, 0xfc, 0x2, 0x2, 0x9, 0x2828b755, 0x4, 0x1, 0x9, 0xfff, 0x5, 0x0, 0x1ff, 0x9, 0x1b, 0x2, 0x1, 0x5, 0x3, 0x3, 0x8, 0x5, 0x0, 0x3, 0x3, 0x20, 0x5, 0x0, 0xdf2, 0x2, 0xc8e2, 0x1, 0x0, 0x8, 0x3f9a, 0x100, 0x1, 0x7fffffff, 0x2, 0x1000, 0x1000, 0x8de, 0x6, 0x4, 0x6, 0x8, 0x1, 0x80, 0x8, 0x80, 0x9, 0xe, 0x100020, 0x2, 0x10001, 0x83b, 0x766, 0x3, 0x40, 0x8, 0xcce0, 0x2, 0x8f6, 0x2, 0x3, 0x7, 0x1, 0x7, 0x80000001, 0x81, 0x0, 0x6, 0x170, 0x4, 0x401, 0x9, 0x2, 0x1000, 0x10001, 0x1000, 0x7, 0x5, 0x8, 0x9d, 0x5, 0x3, 0x279ccefc, 0xffffffff, 0x7, 0x40, 0x1000, 0x10000, 0x816, 0x3, 0x800, 0xffffffff, 0x4, 0x6, 0x5, 0x800000, 0x8, 0x3f, 0x80000000, 0x1f, 0x1, 0x7, 0x80, 0x54, 0x9, 0x0, 0x2, 0x7f, 0x8, 0xff, 0xbfd5, 0x4, 0x8ba, 0xfffffffd, 0x1000, 0x200, 0xfffff37a, 0x9a, 0x21, 0x100, 0x9, 0x10001]}) 20:30:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x22024, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xdb, 0x0, @perf_bp={0x0, 0x8}, 0x8, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4}, 0x0, 0x400000000, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) preadv(r0, &(0x7f0000000000)=[{&(0x7f0000000100)=""/240, 0xf0}], 0x1, 0x9, 0x3ff) 20:30:14 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:30:14 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:30:14 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:14 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0xdb81, 0x4, &(0x7f0000000440)=[{&(0x7f0000000140)="e2c2974b23e7e1577cef5547e896e162f3f38bce1c251b38f7d6c2ef8415b7b9310b0b43c02008ca934b66a15cfdc62df5d49a4eaf778e3d02d57782f73d4a325fe4dad3b7614d36cf0251c502b9443a12d631bf03746065d0edfdab4c4c56d88f25bf0b3f2a5b5eed3699250fef4c4849dfed46efa6120d776f57557e3f06919a92b03c4cb06daf4854f89b2224ea62c2268ecedf14b70b68ce50daec2a6b73d4cf674d83360aab9d4a892958b7ff4f875880015549b5e4a53bcfed2df141d9a3d863fcf2f62b247f0a577af1183c6073892064911b1028ed1cc609c78f", 0xde, 0x7ff}, {&(0x7f0000000240)="1113e07228ddef85fe074f79f3965f6ff01a6a01ec268026a245bc812f06b17e71847fa0fefa9a3a99017040026364ff625e9cd913469df50b60872e490fecb08b338691124a0c48b40c129652168a1dfe257c1e5f4ac99d6fa9e485327fb522cde64c434cf213597f04228623ed348b8ac005dc4104220bbb28081bb0f5ec413040e0b907597222e963e972e07baf50a890f19cf35bee39f6a3beb765e950bfc02c0ec4a952ceaff5", 0xa9}, {&(0x7f0000000300)="1edc3dbed3e17f2b97c6c3ada9c8a3788605dead649854c0d7c7f82c9152d1df896bb66fe24a1ca8c44bdc5d13a44c25ca69d87054ed2cf05d4e7c2f5d1b71343e32904ed1419b02e307c8bbe713de6b15bd7a3b03924dccea693eb0f7ccb63c41b9453bddb0b249eacf60fc7789f2287a2b48f8343468fddab828a590474de4b4af5f32768863c68ff553a89612efb89a8e1e8bc8c53a88e2bede5b", 0x9c, 0x6}, {&(0x7f00000003c0)="5d7ac7f2ef4f730e0a92f75b9ff7d90d04c4147eb0bc993943d97f288f2e41635784c089f13b429c6da90bcf8c087a154cc4d7e585feaeb3d637d51124390703cf3d1c102b53f56f2c3300837ae3f3", 0x4f, 0x20}], 0x40, &(0x7f00000005c0)=ANY=[@ANYBLOB="73686f72746e616d653d77696e6e742c756e695f786c6174653d312c73686f72746e616d653d65f277696e6e742c73686f72746e616d653d6d697865642c726f6469722c756e695f786c6174653d302c73686f72746e616d653d77696e6e742c696f636861727365743d6b6f69382d722c666f776e65723e", @ANYRESDEC, @ANYBLOB=',fowner<', @ANYRESDEC=0xee00, @ANYBLOB=',\x00']) sendfile(r0, r1, &(0x7f0000000580)=0xffff, 0x4) 20:30:14 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:30:14 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xf}, 0x200, 0x0, 0x2, 0x0, 0x0, 0x0, 0x9}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) read$hiddev(r1, &(0x7f0000000f40)=""/4096, 0x1000) r2 = socket$inet_udplite(0x2, 0x2, 0x88) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") fcntl$dupfd(r2, 0x406, r3) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$HIDIOCAPPLICATION(r4, 0x4802, 0x100) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$LOOP_SET_FD(r5, 0x4c00, r0) 20:30:14 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8914, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:30:25 executing program 7: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000000000000443b4a7c6b90f5a0b0bb544ed0646eaeaaec2ba1e9a66e0c4c17357a464b4ef312948100bf166b09c27ff2d408c6f55f270468ca4e9d57dfc992db97ddf0eba579d8cc3e5a61def3fc61b66721613a613c97926794ff780b21a460b145a0dde07cb6ad04a94e97201590a65e7896", @ANYRES32=r0, @ANYBLOB="000800002eaa3231f40d75bd756f4c43c4868b52b68f2c9cec"]) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = creat(&(0x7f0000000000)='./file0\x00', 0x31) fallocate(r1, 0x8, 0x7fffffff, 0x6) 20:30:25 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8916, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:30:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r1 = gettid() capset(&(0x7f0000000700)={0x20080522, r1}, 0x0) perf_event_open(&(0x7f0000000100)={0x0, 0x80, 0x0, 0x3, 0x6, 0x81, 0x0, 0x7, 0x10, 0xa, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x7f, 0x1, @perf_config_ext={0xffffffff, 0x225f0e38}, 0x8ca, 0x7f, 0x7, 0x4, 0xe2ad, 0x4, 0x7, 0x0, 0x8000, 0x0, 0x4}, r1, 0x9, 0xffffffffffffffff, 0x9) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:25 executing program 2: r0 = gettid() capset(&(0x7f0000000700)={0x20080522, r0}, 0x0) r1 = gettid() capset(&(0x7f0000000700)={0x20080522, r1}, 0x0) gettid() r2 = syz_open_procfs(r0, &(0x7f0000000000)='map_files\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) read$hiddev(r2, &(0x7f0000000180)=""/196, 0xc4) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:25 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8"}, 0xd1, 0x0) 20:30:25 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:30:25 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:30:25 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:25 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:25 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") pread64(r2, &(0x7f0000000140)=""/172, 0xac, 0x7f) socket$inet6_udp(0xa, 0x2, 0x0) 20:30:25 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:30:25 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:30:25 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x12) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000000)=0x0) r1 = syz_open_procfs(r0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0, 0x8}, 0x0, 0x3}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$EXT4_IOC_PRECACHE_EXTENTS(r1, 0x6612) 20:30:25 executing program 7: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:25 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:30:26 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:30:26 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8918, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:30:26 executing program 6: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:30:26 executing program 7: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:26 executing program 0: r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r2 = gettid() capset(&(0x7f0000000700)={0x20080522, r2}, 0x0) perf_event_open(&(0x7f0000000140)={0x3, 0x80, 0x1f, 0x6, 0x20, 0x1, 0x0, 0xfffffffffffffff7, 0x40, 0xa, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, @perf_bp={&(0x7f0000000100), 0x6}, 0x14600, 0x9, 0x2, 0x8, 0x1, 0x2, 0xfffc, 0x0, 0x0, 0x0, 0xfe0000}, r2, 0x6, r1, 0x3) ioctl$BTRFS_IOC_BALANCE_CTL(r0, 0x40049421, 0x2) ioctl$RTC_WKALM_RD(r1, 0x80287010, &(0x7f0000000000)) read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:26 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) 20:30:38 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_PAUSE_OUTPUT(r0, 0x40042409, 0x0) pwritev(r0, &(0x7f0000000400)=[{&(0x7f0000000100)="405e93f6a56d2c2c4e25d440802b016308e65075b91999e221e58f28462552ba87f4b9a079b10a4066388a487c74ee95a058f70c19d2533897b90915cf87c62c89411dc7bc8861e55043f9ac8fdd0767e363e155d805456b083ce5dff1e4f8a92afe89c98098998a9298c8d24329d082d1e1f622e774f1726815cf8353bf32e8ffff0dd7a3eac38aa9f3d62226c224995ff50a4050660adf5f", 0x99}, {&(0x7f0000000000)="8ec7", 0x2}, {&(0x7f00000001c0)="34a2d5d88b0f9f467421712aa4bccb1ef929b0670befd4a75cd0e83c1a9a42b1b48da9dbda6eff162dafdcba2ae67378c06cdcf6e5a7c6183fcefc23e66dda4a43535e578c30979116cbfc7f7b34a7e0314391d49c34c21f79d22b571c5ef8f37cdb739cb11682ac387613482379a02042b88e89565b6335ce8ddaae83badb937c8b1b148d6e240d1f377fb3a6e8fc51df9269c43bc80ce94fb784680942e4eb3212115b00f56ea88ce2911e196eb608d4b9b0d34a9fba42a1c350", 0xbb}, {&(0x7f0000000280)="f440588029a52f5de17ad1e0e10303419c63ae35de50d666402e8b2f14392fd6350a76867d5304be85ba148374b3ffcf2f3cb1f34ea469a3d48f39836438a3096b362dc136141537d945e8087e11f348e4b411c008ebc7fdf572522702d1e483e100ec61611550", 0x67}, {&(0x7f0000000300)="58e989422c764d605dfdbd7333c3c8c90776fa22d2f45722059fb816fd580dee612db3b4b6bba47a40d0a327cea5dadf1fe4206d19274a1ba65784a572bd45c84f24ad4c398bf851798ae190e105fc3fe6ff4f29a1f74662075b656053a0d20859f18507fb8bb173567f532dfad5fc16d0dccb74d0d5525560df01d435667bb2d998fab602d5204b935d3ba2ef238e4c2fd6faf240b2af149cca5e1dff77eedf17e1437c4a9f6fdb91cd3a433f127fc70af9260756bec9911c4fae8f5b17cd79b9d4ac8927c4778d0283a04fa63c553fc42a52fb7a2b58715979afd6064ff41889e51242400aedcf17", 0xe9}], 0x5, 0x5, 0xffffffff) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:38 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:38 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, &(0x7f0000000180)=0x1) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, r2) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r2) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:38 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x891d, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:30:38 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:30:38 executing program 7: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:38 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) 20:30:38 executing program 0: socket$netlink(0x10, 0x3, 0x6) r0 = perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) pread64(r0, &(0x7f0000000100)=""/245, 0xf5, 0x8f) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x8, 0x81, 0x1, 0x7f, 0x0, 0xffffffffffffffff, 0x20000, 0x4, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x2, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x8, 0x1, @perf_bp, 0x10081, 0x41ba, 0x401, 0x7, 0x4, 0xfffffff7, 0xc7ba, 0x0, 0x4, 0x0, 0x3ff}, 0xffffffffffffffff, 0x1, r1, 0x1) epoll_ctl$EPOLL_CTL_MOD(r1, 0x3, r1, &(0x7f0000000280)={0x80000000}) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:38 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$random(0xffffffffffffff9c, &(0x7f0000000000), 0x2, 0x0) write(r0, &(0x7f0000000100)="be6dbb9f2a9cbd466c544c2c45ef1e21dcb7eaa864bc7b00d576d81d15a82f376deb4f00910ec429e446434556be8f954765a2993861c7", 0x37) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") sendfile(r2, r0, &(0x7f0000000140)=0x5, 0x1) read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:38 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000001140)=0x1, 0x4) 20:30:38 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:38 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f16"}, 0xd8, 0x0) 20:30:38 executing program 2: openat$null(0xffffffffffffff9c, &(0x7f0000000140), 0x400700, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/snmp6\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:53 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x891e, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:30:53 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) r2 = openat$cgroup_devices(r1, &(0x7f0000000180)='devices.allow\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) io_submit(0x0, 0x4, &(0x7f0000000600)=[&(0x7f0000000280)={0x0, 0x0, 0x0, 0x2, 0x101, r2, &(0x7f00000001c0)="f0287841811ffac2474c91e0487d189ac2f47908d0a379ad22601ab30747df6da48d601dbfb9415ff6cfb5cfd79f58acb67d6cefc1dc538fd0eca26f0bcae2d215a770b6a3ea1a11c1429801a0aa423fd2a3a02361a4c1b74cf547099783dc59fa881c987748076b58870e147a0c65dbd254c2695cc70a5c9a56c2cbbb1d3e3f7629caa7a0ceafb0de28b4a8a3e581a01aed954eb1e9cd69f865d68cd19a3b645c49182f5fc16cf3d13d65a7affb47b9b530a205793fb82978643e136d1c9db1", 0xc0, 0x857, 0x0, 0x1, r1}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x6, 0xe3da, r0, &(0x7f00000002c0)="5f09f634d5d6a8982bc1d522f9e34d0a0ca4750ebb38f99e9efc105e6e46c910c566f45a4194bb5f5ff9d4055f005c8ac0a95d191d3505854784ff4a4f0a29145d7da2af723e3214e74b90e33a8a80737c00fb3431550bf946264a1af46a50abe09925ccb1d8ee03643459383672511d05", 0x71, 0x3, 0x0, 0x3, r1}, &(0x7f0000000480)={0x0, 0x0, 0x0, 0x8, 0x400, r0, &(0x7f0000000380)="f06da8b977f6a6104eed57354dfdb665a467f10bb316862e8ea656776ddf78c97020369e28bfa8b471336cd5e077b5bf894a83373dc98fe06dbd147863170dcbf46008b676990907d51fc36c352e3fc94ce046c39613dff14e2d61d29d5842b5f97730611e7038ee2c9f3c438f020c887f389ac9cfe20fa460838d81ba75b07785a616a39def40b54b75586b6971e6fc7af56b9b2da334739e27174040cd912bb41aee4bca124233d2c31027d4c20cd7b5dbf14c0aec69ad86666db7418f96919ed4126063e42fa6f398df2cdd75da573135986a97318cd66400772158de", 0xde, 0x3, 0x0, 0x3, r3}, &(0x7f00000005c0)={0x0, 0x0, 0x0, 0x1, 0x40, r4, &(0x7f00000004c0)="8fa2e7ed751fe4c2b07cf40334fab0bcfe6de1a8b0fdff89df4cae753535c61f540e68c45d2e287e2e46c189af2b141b6b5590f67c81a123d98774f2afa33821788324d5c7341118dafb8d30d2ca295a7a6a7bd0e89373e4d166469562fdede4f7fb69c4277b1c4343e04b1db1d1a17ca507d5d81b2d6939767ab8f1b82bbf42732666f33946bb79176dfa37e64b9a0e0efff5b3bb8e0df1fda31dc68345140adf5cf4429c9a42c456d9b3d870007a7a732eb7719a1cc48576d927155a61ddd545eb12a3f8ee", 0xc6, 0x3, 0x0, 0x2, r5}]) fcntl$setflags(r2, 0x2, 0x1) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x8, 0x21, 0x41, 0xa4, 0x0, 0x10d2, 0x2004, 0xb, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, @perf_bp={&(0x7f0000000000), 0x8}, 0xa1a, 0x56, 0x2, 0x7, 0x6, 0x9, 0x3ff, 0x0, 0x6, 0x0, 0x1}, 0x0, 0xb, r0, 0x0) 20:30:53 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:53 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000001140)=0x1, 0x4) 20:30:53 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:30:53 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) 20:30:53 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000000)='io.pressure\x00', 0x2, 0x0) write$binfmt_elf64(r1, &(0x7f0000000140)={{0x7f, 0x45, 0x4c, 0x46, 0x3f, 0x8, 0x9, 0x3f, 0x401, 0x3, 0x3, 0x7c, 0x1e8, 0x40, 0x39c, 0x4, 0x8000, 0x38, 0x1, 0xa7, 0x0, 0x200}, [{0x6, 0x3, 0x7, 0x3ff, 0x8, 0x4, 0xffffffff, 0x3}], "4b2228b502e1a7a661f2716d0ad5eee72b372e56996897ff0502b2338d0c07c11b76f392d67d453567f0f6ea25101afe17f2321b52dc026b965bd86a8adbaedcc6dcb910b28d0f0e6fe07abf16bf596a6d0e2ba4ac95a5b00e9f2e", ['\x00']}, 0x1d3) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:30:53 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(0xffffffffffffffff, 0xc4089434, &(0x7f0000000000)={0x0, 0x8, 0x1, [0x1c000000, 0x3, 0x1000, 0x74, 0x10000], [0xf01, 0x1, 0xd1, 0x7ffd, 0x401, 0x1ff, 0x100, 0x10000, 0x52, 0xfffffffffffffff8, 0x1, 0x2c4, 0xff, 0x8, 0xffffffff, 0x8000000000000, 0xffffffffffff6fe4, 0x2, 0x2, 0x81, 0x100000001, 0x6, 0x0, 0x9, 0x75b7, 0xff, 0x3, 0x100000000, 0x62b, 0x710, 0x3, 0x4, 0x7f, 0x5, 0x2, 0x0, 0x0, 0x80000001, 0x80, 0x9, 0x3, 0x7, 0x5d, 0x3283, 0x0, 0x200, 0x6, 0x10000, 0x100, 0x3, 0xffffffffffffffff, 0x1, 0x1, 0x10001, 0xe1, 0x7, 0x4, 0x1, 0x6, 0x80200000, 0x8, 0x100, 0x7, 0x1, 0x0, 0x8001, 0x3, 0x9, 0x4, 0xe187, 0x5, 0x3ff, 0x19a07a7c, 0x1, 0x20, 0x4, 0x7, 0x4, 0x9, 0x84f7, 0x9, 0x5, 0x4, 0x6, 0x3, 0x9, 0x8, 0x0, 0x1f, 0x0, 0x1, 0x1, 0x3, 0x80, 0x10000, 0x0, 0x4, 0x100000000, 0x7f, 0x80, 0x400, 0xfff, 0x1, 0x7, 0x7ff, 0x1, 0x100000001, 0x1, 0x100, 0xffd, 0x80000000, 0x540, 0x20, 0x2fdcbf40, 0x100000001, 0x5, 0x7fff, 0x1, 0x3, 0x7, 0x3ff]}) r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000540), 0x142, 0x0) ioctl$PERF_EVENT_IOC_PERIOD(r0, 0x40082404, &(0x7f0000000580)) perf_event_open(&(0x7f00000004c0)={0x0, 0x80, 0x3, 0x40, 0xa2, 0x68, 0x0, 0x9, 0x10018, 0x6, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x9, 0x1, @perf_config_ext={0x401, 0x7}, 0x40, 0x9, 0x5, 0x1, 0x2, 0x9, 0x6, 0x0, 0x6, 0x0, 0x80}, 0x0, 0x10, r0, 0xb) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f00000005c0)='/proc/asound/seq/clients\x00', 0x0, 0x0) pwritev2(r1, &(0x7f0000000700)=[{&(0x7f0000000600)="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", 0xfe}], 0x1, 0x7, 0x9, 0x20) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') perf_event_open(&(0x7f0000000440)={0x1, 0x80, 0x9, 0x1, 0x3f, 0xfe, 0x0, 0x5, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x2, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x1, 0x5}, 0x40000, 0x10000, 0x400, 0x5, 0xff2, 0x4, 0x1f, 0x0, 0x23, 0x0, 0xed33}, 0xffffffffffffffff, 0x7, 0xffffffffffffffff, 0x0) 20:30:53 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000001140)=0x1, 0x4) 20:30:53 executing program 6: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:30:53 executing program 0: setsockopt$inet_tcp_TCP_MD5SIG(0xffffffffffffffff, 0x6, 0xe, &(0x7f0000000780)={@in={{0x2, 0x4e23, @remote}}, 0x0, 0x0, 0x1e, 0x0, "cded259b3820106c31c382cac04051d48702c3852f546f3d281e060bba3e2d76dcbff79714cc9bfdec1ff26308f8d2f6e72ea0745084a6b2e8221daa2a9babfa72db0dd0a547d6cdee55bf79a6744573"}, 0xd8) write$P9_RREMOVE(0xffffffffffffffff, &(0x7f0000000000)={0x7, 0x7b, 0x2}, 0x7) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(0xffffffffffffffff, 0xc018937e, &(0x7f0000000500)=ANY=[]) r1 = open_tree(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x80800) readv(r1, &(0x7f0000000480)=[{&(0x7f0000000140)=""/3, 0x3}, {&(0x7f0000000180)=""/30, 0x1e}, {&(0x7f0000000200)=""/18, 0x12}, {&(0x7f0000000880)=""/208, 0xd0}, {&(0x7f0000000f40)=""/4096, 0x1000}, {&(0x7f0000000300)=""/38, 0x26}, {&(0x7f0000000340)=""/175, 0xaf}, {&(0x7f0000000400)=""/72, 0x48}], 0x8) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000600), 0x100, 0x0) r2 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000000740), 0xd0e40, 0x0) ioctl$LOOP_SET_STATUS64(r2, 0x4c04, &(0x7f0000000640)={0x0, 0x0, 0x0, 0x400, 0x8000, 0x0, 0x6, 0x22, 0x11, "acf2435bb574d24835499bba5a7c7abb63b210247a86be10c44611462e674e9a4e1b10853114e49bcf160026f20dd28224739dd178ee510919ed963300cc834f", "b5b0deeb9ca2f0f5411672cd984e3e423edfb3a26d805fda56ccbc8174d983345d5a5d070a0a57902f4f9c128a28a8f9e43c3e4c735bcbb12533e5bb718fcbd3", "bdc1d4706ebcfcc0bf09d8c13053061d412cd3d3456efea7b071ff3cd9c6fe8f", [0x80, 0x2]}) read$hiddev(r0, &(0x7f0000000040)=""/160, 0xa0) r3 = perf_event_open(0x0, 0xffffffffffffffff, 0x80009, r0, 0xb) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) r5 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r5, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r1, 0xc018937c, &(0x7f0000000540)={{0x1, 0x1, 0x18, r3, {0x4}}, './file0\x00'}) ioctl$EVIOCGKEYCODE(r6, 0x80084504, &(0x7f0000000580)=""/83) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r7, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") tee(r5, r7, 0x200, 0xc0ea1f06a2ac428) 20:31:06 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:31:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = syz_io_uring_setup(0x3c72, &(0x7f0000000280), &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000300), &(0x7f0000000180)) io_uring_enter(r1, 0x1, 0x1, 0x1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(0xffffffffffffffff, 0xc018937c, &(0x7f0000000000)=ANY=[@ANYBLOB="0100d3001800000000000000", @ANYRES32=r1, @ANYBLOB="02000000000000002e2f66696c653000"]) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) io_uring_register$IORING_REGISTER_EVENTFD(r1, 0x4, &(0x7f0000000240)=r2, 0x1) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000000)='net/udplite6\x00') r4 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") pread64(r4, &(0x7f0000000140)=""/229, 0xe5, 0x7) read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:06 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$BTRFS_IOC_SCRUB_CANCEL(r0, 0x941c, 0x0) 20:31:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x3, 0xdb, 0x6, 0x3f, 0x0, 0x80000000, 0x2000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x3, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_bp, 0x620, 0x5, 0x8001, 0x9, 0x0, 0x1496, 0x3ff, 0x0, 0x40000000, 0x0, 0x7}, 0xffffffffffffffff, 0xa, r0, 0x2) ioctl$int_in(r1, 0x5421, &(0x7f0000000180)=0x5) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r0, 0xc0189374, &(0x7f0000000240)=ANY=[@ANYBLOB="0100000001000000180000b1", @ANYRES32=r0, @ANYBLOB='\a\x00\x00\x00\x00\x00\x00\x00./file0\x00']) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$PERF_EVENT_IOC_MODIFY_ATTRIBUTES(r2, 0x4008240b, &(0x7f00000001c0)={0x0, 0x80, 0x2, 0x2, 0x1, 0x3f, 0x0, 0x1f, 0xabce7449e0f36601, 0x14, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x20, 0x0, @perf_config_ext={0x62817fd8, 0x8}, 0x800, 0xfffffffffffffffa, 0x8000, 0x3, 0x1ff, 0x5, 0x7, 0x0, 0x4dd2, 0x0, 0x8}) 20:31:06 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0]) 20:31:06 executing program 6: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:31:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, 0x0) 20:31:06 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x891f, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:31:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, 0x0) 20:31:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, 0x0) 20:31:06 executing program 6: setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:31:06 executing program 0: perf_event_open(0x0, 0x0, 0xfffffffffffffffc, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_opts(0xffffffffffffffff, 0x29, 0x1, &(0x7f0000000e80)=@routing={0x2, 0x0, 0x0, 0x3}, 0x8) clock_gettime(0x0, &(0x7f0000005a40)={0x0, 0x0}) recvmmsg$unix(0xffffffffffffffff, &(0x7f00000057c0)=[{{0x0, 0x0, &(0x7f0000000580)=[{&(0x7f0000000040)=""/15, 0xf}, {&(0x7f0000000080)=""/4, 0x4}, {&(0x7f00000000c0)=""/113, 0x71}, {&(0x7f0000000140)=""/104, 0x68}, {&(0x7f00000001c0)=""/44, 0x2c}, {&(0x7f0000000200)=""/209, 0xd1}, {&(0x7f0000000300)=""/216, 0xd8}, {&(0x7f0000000400)=""/121, 0x79}, {&(0x7f0000000480)=""/26, 0x1a}, {&(0x7f00000004c0)=""/191, 0xbf}], 0xa, &(0x7f0000000640)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x70}}, {{&(0x7f00000006c0), 0x6e, &(0x7f0000000840)=[{&(0x7f0000000740)=""/194, 0xc2}], 0x1, &(0x7f0000000880)=[@rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x20}}, {{&(0x7f00000008c0), 0x6e, &(0x7f0000000980)=[{&(0x7f0000000940)=""/41, 0x29}], 0x1, &(0x7f00000009c0)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x40}}, {{&(0x7f0000000a00)=@abs, 0x6e, &(0x7f0000000bc0)=[{&(0x7f0000000a80)=""/144, 0x90}, {&(0x7f0000000b40)=""/67, 0x43}], 0x2, &(0x7f0000000c00)=[@cred={{0x1c}}], 0x20}}, {{&(0x7f0000000c40), 0x6e, &(0x7f0000000ec0)=[{&(0x7f0000000cc0)=""/230, 0xe6}, {&(0x7f0000005b40)=""/197, 0xc5}, {&(0x7f0000000f40)=""/126, 0x7e}], 0x3, &(0x7f0000000fc0)=[@cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x1c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x118}}, {{0x0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000001100)=""/90, 0x5a}, {&(0x7f0000001180)=""/23, 0x17}, {&(0x7f00000011c0)=""/4096, 0x1000}, {&(0x7f00000021c0)=""/222, 0xde}, {&(0x7f00000022c0)=""/25, 0x19}, {&(0x7f0000002300)=""/15, 0xf}, {&(0x7f0000002340)=""/40, 0x28}, {&(0x7f0000000dc0)=""/82, 0x52}, {&(0x7f0000002400)=""/207, 0xcf}, {&(0x7f0000002500)=""/172, 0xac}], 0xa, &(0x7f0000002680)=[@rights={{0x24, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x38, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x60}}, {{&(0x7f0000002700)=@abs, 0x6e, &(0x7f0000002980)=[{&(0x7f0000002780)=""/31, 0x1f}, {&(0x7f00000027c0)=""/196, 0xc4}, {&(0x7f00000028c0)=""/189, 0xbd}], 0x3}}, {{&(0x7f00000029c0)=@abs, 0x6e, &(0x7f0000002e00)=[{&(0x7f0000002a40)=""/75, 0x4b}, {&(0x7f0000002ac0)=""/243, 0xf3}, {&(0x7f0000002bc0)=""/193, 0xc1}, {&(0x7f0000002cc0)=""/16, 0x10}, {&(0x7f0000002d00)=""/214, 0xd6}], 0x5, &(0x7f0000002e80)=[@cred={{0x1c}}, @rights={{0x28, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0xb8}}, {{&(0x7f0000002f40)=@abs, 0x6e, &(0x7f0000003440)=[{&(0x7f0000002fc0)=""/92, 0x5c}, {&(0x7f0000003040)=""/170, 0xaa}, {&(0x7f0000003100)=""/122, 0x7a}, {&(0x7f0000003180)=""/227, 0xe3}, {&(0x7f0000003280)=""/184, 0xb8}, {&(0x7f0000003340)=""/245, 0xf5}], 0x6, &(0x7f00000034c0)=ANY=[@ANYBLOB="18000000000000000100000001000000", @ANYRES32, @ANYRES32, @ANYBLOB="1c000000000001000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB="0000000018000000000000000100000001000000", @ANYRES32=0xffffffffffffffff, @ANYRES32, @ANYBLOB="1c000000000000000100000002000000", @ANYRES32=0x0, @ANYRES32=0x0, @ANYRES32=0x0, @ANYBLOB='\x00\x00\x00\x00'], 0x70}}, {{0x0, 0x0, &(0x7f0000005700)=[{&(0x7f0000003540)=""/4096, 0x1000}, {&(0x7f0000004540)=""/39, 0x27}, {&(0x7f0000004580)=""/4096, 0x1000}, {&(0x7f0000005580)=""/136, 0x88}, {&(0x7f0000005640)=""/186, 0xba}], 0x5, &(0x7f0000005780)=[@rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x18}}], 0xa, 0x10040, &(0x7f0000005a80)={r2, r3+10000000}) r5 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) r6 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000005ac0)='cpu.pressure\x00', 0x2, 0x0) r7 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r7, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") r8 = socket$inet6_udp(0xa, 0x2, 0x0) r9 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r9, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") r10 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r10, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") io_uring_register$IORING_REGISTER_FILES(r4, 0x2, &(0x7f0000005b00)=[r0, r5, r6, r1, r7, r8, r9, r10], 0x8) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="060000007c49a5343d804e58e83a") fcntl$setstatus(r0, 0x4, 0x4400) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') 20:31:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') io_setup(0xd29, &(0x7f0000000780)=0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000640)=[{&(0x7f00000002c0)="19", 0x1}], 0x1, 0x8000000, 0x0) io_submit(r1, 0x3, &(0x7f0000000600)=[&(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, r2, &(0x7f0000000000)="1c", 0x1}, 0x0, 0x0]) io_submit(r1, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x6, 0x6, 0xffffffffffffffff, &(0x7f0000000f40)="3291197b3447c52b18610dc9bdcff239baef47f357770c49216353489106b4a9d11954221900eb648f433de71ed2a0822b8dfdf436fa04bd4c0ca50e4fbfeb4cbdcbc8d49f511bc04fc9cf572ac59ae6ff18b1fc814ab4cb3a642ba429eece87d84fe0acb33f5b98c084c7c6a5a7387ff4b1791e37e746d201cc23dabdd08de0c2294f974e127c28b5328cded23eea0dabf069e9fc062f52c300d80baae0cd70e2b50587217132bbfd5fb53d8987ce8cf2876ae7651f2ee9165b89b07a1f5b63f0e9d6d864d05728ae11b4c68c72e030c7a6ee1cbdd3ba45c309002a10c75c2ac83860a6bbcd9e1316d6e741a4eb2bf7d7638c71ee038fee994c2adae1ae8a834ceb5cabddbeb4cc3409df6dad64ff368cfe23bd7faaa08c31a89eb4e824e4e1e1b013788d5e843dbf86de1d8283855609e3ae98316977456736f5349a5d52aa22b9294684a23fc5b5084e53ccd1baba519f357696ee29225364d9934624ed8ca838fec389ab4610b5518abdb357cf756f5c9738a4b047593d07bd6ea1024546a2a950735e6c1923dc7ee2450a1e5020092f5a8f68fd45bfa19c520785c037db08c6a8c63904230e1f66a022110e3196bfb079979f221769d79210e99922c4d218132af39aa41fb5683058dc08f4e6953c6cd015576b70cd9d5847eb823aee081830437ce10062f9387dd398cf552ce4aec5c9234242110d7a01eacc87fc734e8e38732647065f6229e1fa0ea62037d423ad2a18e90a77e7386debc508fa49c4fc745486eeda747f6e5ccb254933ad1a776d86b5f680cb94025ced0df32cca131c9c7a738e91224963054a5133e5e37872db559764970cfa2fec738f4d0a17ec4c6a1b69bd5c1a4183612e9662395ea87cef2b563b96f46773089a1cc46701a18fc47fb1398f14d79c7aeedc41418470d4a09d876e622a652f818d3104f66a0decd104f9e084bd948970f47ccd20a637f3bac32910edcf5d734a0bc911e0950ae59f5c2cd6fabbd7ed9f59b691d1a2b984923262dae17621818c0b16ac96d4a9bf8b031f27d39325002937192a6d489af9821a3f82115326f910887e789dc60f9ab44cea9575fd0e6d2f3e7353558965d6f920d84575ef75bdb391742e018427befa868ee9413226f9ed337838e92b106aeb90115aa92037896f87dbeca55d7652d71442839493e16bea9e91f81e24a276a80d69771d80bb968ddf2cffbe683064ce863355196341040f5921f34c40a4ea70289a145ee94ce9221616bb471a3f588f67b8b4c0d3b4ee51261c9f4abe0a853d5cb01ab0d47c0d92ae893a94eca72afde6222aad27e06e7dd45903beb0bbad22489be80aa710f863043ba1bbac4e6ff27d4cd557fd84affd07be21e15505667cd700dd1e54f8deab0dfab8d6184462d50590cff404539f64d11634fcb7ded9191b6c1c6c9334c25231bcda62485060a1485343a61f728c99339a8caa3385bf144bec0cacded5a07d19d8961828a17800edba7c652a58a6158f9a691597c0948f0fddfa590fcf7e40d8b6b326f14441ad677212bca259b55d075730198a0c3b1bfb578494a20ee255b7258e6b6db3dbe9cf5570d67fa99c909c854c36938cde8ee7703dcc009caff0d4621c3c103d193ef6167588de58a8b5475f49696191addf455e397f54d611db5f1949695ddba700b1ea423df9378158e3e26f1e0c5e8280954aba36a857cce10c22631babfd26c88c05f7024b2a7227f966740063283d9b48b8e2cabe718d491acc262283e5c9e52e118ff2f5f173cd884e3c3d47ece4005d74f2f95934d52d96d60c9f0aa3afdd13fcf1d9011ca5b7cffedd809a3c0a24cb5941120392bc9862447a22b419251b4122e7c883cb74fa34aaaa39d1ac33aa63c89cf386ace4b12b3c303ebf564b97ae37b08d7f0ff9b55a0323fbc1ebc65becea8365e39b693ddc7ff4f62925c1880690cc81a2103d21c90a7b17d044adfbc214ca5f4b3c5d2e05cb87d05e5186641cd0b170f2f989e3680c4b474c7b28aa5050bf95c067c730903405a7dfb369c121c8f3cd61c0c1af6c58386d0cd383b4692808c2f890c56184e3a1d74e702d08b3ea631e78ad662602006fa4c0956d4e63a064e14e354d883db4ae8f3fbcb8a553fc78b67eacc3b366b916e42d0822269649c1646e03832157c2e229e471e9ca2287221adac7b2a9869994bd5ab8c5f878fb0698eafa80a9f271b989ce092e8870a0b03f97b390c4578426d0281b95fd1c1e403bc0627782f4ec81c27d3381393b32bca0472610b6c76039e71c98706704cba344c242622a7234666b4c228c0faf2f90a2d870359dd7682a287ce8390d74133caa57438e57f96022a3b949449ab53f7af5b8f152ecc86ee11e90f2e09642162ac140713a62991b333d8c8e28901c620d62ee75c4ce87c04d90b41bcf6418a55c95db441578d5fbc3a521e7bd530ad9fe876c952062e7d11a34632dfe1478f0b764bb279d3b881e3d80e2d9d46364d8284239f7ea94e8871e0f21ec9bfd048d7ccd8d908822cdaf2274bfd408d311d886bb9cf05b6704c6e0ef8867f27f15ddbeca72a7a9bfcceab540ba818051fd70fd52c35d21791067711cb20ca47641536a6eb024fdaa917da7a9b5f201c40eac11362d3330ffd1312ac8ae6233dead2d2c16d51c54a68cd4ff438acc768363f5a5a46167f932284fb500a757465768f0429435950898e1518bde41a1047a2f5bdbc076cb3dc201a499f450ecf4a762523301a19da37e29f8aca074dc8a8fcdf3a4aad139269566bc17f42852e9147b9fc8f0fe58b2a04e7cb776b576a3d6f5e527fea51966df83511294eacee28067d4394ac3c9c3252e6ea27885ea921be52a60aa5d450b0647d36689fb0b8324b3246ee8a901277bc8ee2efdc38aaebdc6f75ade8e4e40f57a051d2e48438972fc199a7e4b6251e04aa59e2f5fb56fa56a79fb3678d8cdacbf3b8f75d527cfe3f261524c8710e55e2ebef6b1d96bb2f873ba0ae91b73d76363a762d4b2d719970dcf108039b15588c1b45b0f3a982d5666cf4806dd87c6db4021915afb50c4ef7f698e8f9fe110eca4e2d9830ad6e0b7f81930d948c55a5f1c0722b4fad79e209970969b22ee4e31ae83661627d1262fda1ff27a28b2536bde62e0c838e4448f5a703766ec336398cacc286317b56298440c41a16033f58a0978a5345fef8317ea31907e413370603fa6f4cbde2e6998bfe2c9f13b16b68b940f8c336b6680d4320feba01b98a7a4227a11f217239c9f87c0865d5d6ecfaf3c167fe31893efc762228c3522a4c715f03eab3e150596934bfba007136cc539b164da025d5ecae89521ddb65e151355cbfcbb714eaa8a34bc1aa48b4372a4cee64ccd179d7469b686f0889779a496a413861b22a9bbab2a70948bad709418594ea2a3e3762c174333249abaad874692c5f5614bdb7ca2c25f7dbb51ecc05b205315ff8b90af4d210b6288e0fe4570ebdcc3b1d7a6fc9cacccaaa6c4cf53ed2063d94c15795ab0d45d0635c8967c58df3fdea56a95af68a785ff1598cee6668ce87fccd0bb5d0dcb8987a1773668cbd7dc9557e6d5636ab272c5f1074a7ef57204d89a45b8d3d6cceaf2e46b8fdf94df8440af0010f6f54dc7d6babcda422d0e61396f3a450138173e50b084b6100e1e2bf38c3559bb69e4ac8921324f88834b6603d3950df886fe68844564d0d792f3a754dd60ecef7aaf12f6cc3bfb6a1b5b293186b77dd1cf3e582a034d8c6bed6cbc154a90a24c312faee0ce16e6b99911aa30b56365332da8430b13d610c27562ffedd10399e5d181bc2e5b12937b3305ce556a3772ab5f9424b1c94361d21f89de4ac7d8f742a7c0dc154ba354d5a9d4923f9863afbf93aa7cdd2adf7524dbafd4bee886ada6b116a4a60d124f5d579901d038a1bb599ee710138fb47aded20a6ec102d7a69b1505e4b960e93d90c8e8dffe4951be74830323096114f598b0a4f56aefc217df03b1ebdd6d0c1de24a73416409e8e5548550beff3da6f03edbf7db8a9d86efa89a7d2380f111b8ab9a1896d127ec24dcd353163d086266bfe8c3f15bcfb1c4769045e13276817b87632602338748c66dc4acbffd97e8d3a30e3dd63b249eda197157fedf8860bb5c1a29823cf86324921394513a16f0bbaecf8a4f556ecb69fcc778a3e4122743d5fb26c7d9ef2e6163cd67a39ae5b928a7d0fe028ac6b9e1fddf1cafc83d0db606a005d6ac61644d60f92eb064acc548eb7abc5bae61421e5be9043e078b9b748d7d2a5178a15eb3c4e9e43a3f60ba9a95ef1d8e621c141d5e1bfd64cc647c75d5ff26206d4d9386f3bc20676c9a5e2ead7ba5ab90d5ef4d5a2150adc9cd3068e3b9147d417f681dc7b461b720a5048975c28951e7cf9e974efb0a4fd4980c8d56cac376a85b58e4fc732304c4f72879838376adedb7fd4f8e8f4519084452e15c31ec9b8ca087859a437b38c59d05600f66e767b234973fbcba8c8379ba712a01b2707746756a9f1330afa7af633e71ca7a461d0f71511f8d77c01e736d65793ef9368d22ea7cc3effb30fde849e3fed5c9a37ba439dc1edb13e05e6fd5e1234302fa2f8841448bb03b3846b215ca78a4725d1a213d04b17f8fa70e7f7b937fe1fc24ec1012c7754b032d0f51de9b5de9f07c17237b3b448546a6139552f435cd9bbe72f9998fbf7df240af2e0fc64e945fde70e74544d52eb49935b310ef34d8820ee444f485afe1049d2ed8a9425443928dd266c82d0fcede5907c433f461e00fc35a8a898bf836360c1edf8912eb5f613985797f02f3f90157dd65ae34b8416b6274f73f7671d391b24e7a1c3aeb920126578b4eb867884b2f58a5d2bae8aa83a84c709b1aebc50d798bc120aab005f88dfb14cc64123991543099c01cea0be3111745fb952ef2e18dfd26d6d4246201ea915cd4aff25435dc627469c46a61fcccd702edff49e288d2def558a9853281d93654271c5dfc073917cf13d12692cef59912856196c413e1e2256f36414e6b4b7a5bdb7cc33dc4a612217821715910b8560751dd9e11ece940f94f7a9b06cb9e4839b27a8c9e99a208ec3bc5ccef99368ad24c93a5cf5c65fee27958dbaf94ddbd458612e099e643a5b9731ecfd26ee40674c47bf2f8b31998687fcd8a51fe9d25779ea7e914339bd8825bfee7ea8682a7d30c05f6b01a69c378c4dde234e717f34ae78dd193233f7c1cab841da4a67e68d7f36b7f1be90350fdaa5b30ab34d4901c0f3268e7cf5d4d24cdad017ac96e35566db161855d961927c13a9f6d8191fecf434b24bd38fa954278b730564f9d7632e4594a36cf6ea2ff7ac9d4d149637e0b992dbc046e0b4c986782aa37a3f91fabbec6308dacafe97b0d849ca1d8eb050a64a4ef0e853254508ae9753a84f96e64d79f6cbf6dc28e5b0476f63afc8b5c8fe36fb9b1f14b5916da73be9e01fb27897d3d2bc7d6e0551eb6b46a3f4db357c8d6fd1234766ae47a75f839d7d381edd00cfc5ee3c7f5948355d108c04f850782af0800389fc6afeb5cb59b260f7097bf065d24dc54e3c9e848aa9246c9f66aed18e233ab4a4f1dd467f9b56443cb5be7cf966fd5315218265e00c8b03279e5300403395e75f0c884f20b3c3f6f8f5f19a707689ef4ed3cd736b80d63b44ee8b45961ab62dd3afcc75b797c0bd0f5883e45b41eb5708775b27c644a317ca628c4ea4be19565271475b96274577995d4192685f2c97dfacc6d431888a3c49f0eec0fd100c1e1dc48aa97f78f7fb2ef3101a09396d09b83582a24af4b772516554213caf3a1", 0x1000, 0xbc}]) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:06 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0]) 20:31:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140), 0x4) 20:31:06 executing program 6: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:31:06 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:31:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140), 0x4) 20:31:06 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8920, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:31:06 executing program 6: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:31:06 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0]) 20:31:06 executing program 2: ioctl$CDROMSTOP(0xffffffffffffffff, 0x5307) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r2 = dup(r1) ioctl$HIDIOCSUSAGE(r2, 0x4018480c, &(0x7f0000000000)={0x2, 0x2, 0x81, 0x9, 0x0, 0x10000}) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) read$hiddev(r0, &(0x7f0000000140)=""/156, 0x9c) 20:31:06 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140), 0x4) 20:31:06 executing program 6: socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) 20:31:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}, 0x40000}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:06 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:31:06 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') 20:31:18 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x44cc, 0x5}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = gettid() capset(&(0x7f0000000700)={0x20080522, r1}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0x2, 0xe3, 0x3, 0x0, 0x0, 0x100, 0x41000, 0x4, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0xaa9f, 0x4, @perf_config_ext={0x5c, 0x1ff}, 0x12261, 0x585, 0x7, 0x0, 0x100000000, 0xffff8000, 0x4, 0x0, 0xc0f, 0x0, 0x6}, r1, 0x1, 0xffffffffffffffff, 0x0) 20:31:18 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000001140)=0x1, 0x4) 20:31:18 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') signalfd(r0, &(0x7f0000000000)={[0xb2]}, 0x8) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) ioctl$HIDIOCGREPORT(r0, 0x400c4807, &(0x7f0000000000)={0x2, 0x100, 0x8b}) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:18 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB]) 20:31:18 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8921, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:31:18 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:31:18 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = syz_io_uring_complete(0x0) r2 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r2, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") dup3(r1, r2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) r4 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_group_source_req(r2, 0x29, 0x2c, &(0x7f0000000140)={0x3, {{0xa, 0x4e21, 0x40, @loopback, 0x2}}, {{0xa, 0x4e21, 0x44baf6f3, @private0={0xfc, 0x0, '\x00', 0x1}, 0x4}}}, 0x108) ioctl$sock_proto_private(r4, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r3, 0xc0189373, &(0x7f0000000100)={{0x1, 0x1, 0x18, r4, {0xcb45}}, './file0\x00'}) 20:31:18 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000001140)=0x1, 0x4) 20:31:18 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r3 = gettid() capset(&(0x7f0000000700)={0x20080522, r3}, 0x0) perf_event_open(&(0x7f0000000140)={0x1, 0x80, 0x0, 0x6, 0x3f, 0x20, 0x0, 0x8001, 0x20, 0x8, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x401, 0x4, @perf_config_ext={0x2eb, 0x2}, 0x20, 0xfe, 0x5, 0x2, 0x31e6, 0x8000, 0x400, 0x0, 0x78c, 0x0, 0x7fffffff}, r3, 0x7, r1, 0x2) read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:18 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8922, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:31:18 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:31:29 executing program 3: perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x7, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:29 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8923, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:31:29 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe"}, 0xdb, 0x0) 20:31:29 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x0, &(0x7f0000001140)=0x1, 0x4) 20:31:29 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB]) 20:31:29 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428d"}, 0xdd, 0x0) 20:31:29 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000140)=ANY=[@ANYBLOB="00000000000000000100000000000000000000000000000071f7a17b0000000000000000000000000000000000000000000400000000000000000000000000000300000005000000001000000000000000000000010000000500000000000000040000000000000000000000000000000000000000000000000000000000000007000000199f00000600000000000000ff7f0000000000000300000000000000000400"/256]) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:29 executing program 0: perf_event_open(0x0, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_FIOGETOWN(r0, 0x8903, &(0x7f0000000380)=0x0) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000400), 0x210081, 0x0) write$binfmt_aout(r3, &(0x7f0000000440)={{0x108, 0x8, 0x0, 0x10c, 0x1b6, 0x1, 0x118, 0x7}, "08535834ee1856718bf2a67a1fc5cf0c94a8b61433ac3ccac958263db2e4be2fb87ff2162af2b81a99eebe43b2455588ec8af8fa68396827a3a47ec89ed055642290ce13cb", ['\x00']}, 0x165) r4 = openat$zero(0xffffffffffffff9c, &(0x7f00000003c0), 0x4403, 0x0) perf_event_open(&(0x7f0000000300)={0x0, 0x80, 0x6, 0x9, 0x23, 0x8, 0x0, 0xfffffffffffffff7, 0x4, 0xf, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x3, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x7fffffff, 0xff}, 0x200, 0x5, 0x40, 0x3, 0x0, 0x3, 0x8000, 0x0, 0xfff, 0x0, 0x80000000}, r2, 0x0, r4, 0x0) ioctl$sock_proto_private(r1, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r1, 0x81f8943c, &(0x7f0000000100)) 20:31:29 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) r2 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) r3 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r3, 0x8913, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") r4 = eventfd(0xf3bf) r5 = openat$autofs(0xffffffffffffff9c, &(0x7f00000006c0), 0x4000, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r0, 0xc0189373, &(0x7f0000000780)={{0x1, 0x1, 0x18, r0, {0x1}}, './file0\x00'}) r7 = signalfd(r0, &(0x7f0000000800)={[0x3]}, 0x8) io_submit(0x0, 0x9, &(0x7f0000000940)=[&(0x7f0000000240)={0x0, 0x0, 0x0, 0x6, 0x400, r0, &(0x7f0000000140)="6614c04c9c4791ecff82a6b62cc75a796d4899b0bac6336df9677d0efd1801715d2e925ac10ea24dd1af8567133ccd39767e12bb7c965c204a25ad93ef6723251528494d011c6ebd0f372a361cbecf7c7a5e2f6b42042f864b0fc920594ebb2e2b8484f35a03406c455885402f5c595444ef4d31ddc278e623f28731579190bdc2626b1f68486a19757edb06d1402728a9b307316a7a4e09f77ef649ce06139315cebb53581232e1ef4ef7a7d7d66cfffa76fe9efc6a9ac77f1d931702df5f94a9978ebb76c8f282ae8921fe4f81", 0xce, 0x0, 0x0, 0x2, r1}, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x5, 0x2, r0, &(0x7f0000000280)="4c745eecdb8d2f0fad3f260527503e4ba47bab235717725ca6af1bb795e5a49ff68250806875f65c62d3a94b37d6cbe097cba0a7b5e5bb44028ef78d126492f7b612672fc7c57d8ac7cf1c31de95958200e9de3b8b302811a0a9f489a735965b4f65a04888bd", 0x66, 0x8, 0x0, 0x2, r0}, &(0x7f0000000340)={0x0, 0x0, 0x0, 0x2, 0x100, r0, &(0x7f0000000f40)="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", 0x1000, 0x862, 0x0, 0x2, r0}, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x7, 0x5, r2, &(0x7f0000000380)="2f9c6e036ab8e70e34d4809acf939254d7f90cb652ec9e1ed8cfd520e85593d4fe46b09417cd11cb209ed37d4c87c226574e207d14adfea83d822d8341a013b990b60f9040c79480fee3d93afa8d259c2b9ed5a4be6a54c44cfbcdad24c7b7df518d71d34f894775f5018df6c720c0ef31d3bab87a5f50b58f00fcc93b3af6145cb25d0e3e6f952cdae854347fc27853215da89c47a01547dc3ba5ae9554695d94fc5993023f78", 0xa7, 0x9, 0x0, 0x2}, &(0x7f0000000500)={0x0, 0x0, 0x0, 0x6, 0xa6b2, r3, &(0x7f0000000480)="9613b2540eafdccb47ffa2507bb13ade0034c0df4c668eb5d1f0a984e46e6869b1a6ae56fb03a14e8d0b2f3e6bb9601fcad75c9be3bf7be3b1da4fc61b335ee9372bdd06bb26a2d7daa0992c176aa724c3dfec", 0x53, 0x1, 0x0, 0x3, r4}, &(0x7f0000000580)={0x0, 0x0, 0x0, 0x7, 0x1, r0, &(0x7f0000000540)="a2062e6c575f95", 0x7, 0x7}, &(0x7f0000000680)={0x0, 0x0, 0x0, 0x6, 0x2, r0, &(0x7f00000005c0)="3ce9fb846964f9f47990a96171f2b634099464791f7090a8b17b54f548739dcd06a47447506f25dfa1dad1308e567b1b1db2887cc89f030118294fc848c109d6c9f17fede847524293ead9f2ea84f4f87a7728c848d5d2a569de29bd382adcb7b4cbdd682b6e68917a7904a05dc4caf81259dd1d9105d15aadb8959e1430c222e4770d0287f78100a9d1e3ea6cc04303394025", 0x93, 0x3, 0x0, 0x2, r0}, &(0x7f00000007c0)={0x0, 0x0, 0x0, 0xa, 0x2, r5, &(0x7f0000000700)="9f27feecc8f7f599555f5ecbc94dfb74d74d85aab2bc4e937430f3c932847ef4f2af25f1873b99fec14ce85f3a0c2d311b1c84ee00789306267e9b8e47eb236e3e3c6b87170c1a8666d07bd8c262ae1dd9a95d2091f99a5844ffb9e804b8", 0x5e, 0x92, 0x0, 0x2, r6}, &(0x7f0000000900)={0x0, 0x0, 0x0, 0x5, 0x9, r7, &(0x7f0000000840)="ef846cd967dd90c078b45459c89657a30ec85a146a60687c9312f4ca444c39f66a9f4c658a6b9cef8386beb4b39be13b0dcd3c5fa14758018fd6b5cf066aa0bc27511ce20f0cf0564aaf7f91c666a24a6d5e36afff3dc2fa948df56ab84ca75ef5c0aadb1a6ecc0791b093774ef09df6aeecd6f88c672d386d4f810e573153f013a4a4814a9a2851995d1d644254256324c300", 0x93, 0x3ff, 0x0, 0x1, r0}]) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'geneve0\x00'}) getsockopt$SO_COOKIE(r6, 0x1, 0x39, &(0x7f00000009c0), &(0x7f0000000a00)=0x8) ioctl$TUNGETVNETHDRSZ(r0, 0x800454d7, &(0x7f0000000100)) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') 20:31:29 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, 0x0) 20:31:29 executing program 7: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c801443445"}, 0xc4, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="04000000000000002e2f66696c653100"]) 20:31:43 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, 0x0) 20:31:43 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB]) 20:31:43 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = gettid() capset(&(0x7f0000000700)={0x20080522, r1}, 0x0) perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xc4, 0xd4, 0x2, 0x0, 0x0, 0x1, 0x80, 0x4, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0xfffffff8, 0x4, @perf_config_ext={0x6, 0x10000}, 0x40000, 0xffffffff, 0x7, 0x8, 0xfff, 0xb1, 0x7f, 0x0, 0x473, 0x0, 0x2}, r1, 0x3, r0, 0x9) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:43 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 1) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:31:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$TIOCGSID(r1, 0x5429, &(0x7f0000000180)) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) perf_event_open(&(0x7f0000000100)={0x5, 0x80, 0x5, 0x40, 0x2, 0xa3, 0x0, 0x5, 0x8000, 0x4, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0xfff, 0x0, @perf_config_ext={0x80000001, 0x4f6}, 0x900, 0x7fffffff, 0x400, 0x8, 0x5, 0xff, 0xfff, 0x0, 0x81, 0x0, 0x101}, r2, 0x3, 0xffffffffffffffff, 0x1) 20:31:43 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0xfffffffffffffffc, 0xffffffffffffffff, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x840040, 0x0) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:43 executing program 7: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8901, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:31:43 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8924, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) 20:31:43 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, 0x0, 0x0) 20:31:43 executing program 2: read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x8004c2, 0x0) syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x9, 0x7, &(0x7f00000003c0)=[{&(0x7f0000000180)="41f72cdcb74d48a1aaa378", 0xb, 0x2}, {&(0x7f00000001c0)="e0", 0x1, 0x3}, {&(0x7f0000000200), 0x0, 0xfffffffffffffe35}, {&(0x7f0000000240)="ff814c", 0x3, 0x1}, {&(0x7f0000000280)="a53f7c1caa538281a63307", 0xb, 0x9}, {&(0x7f00000002c0)="16dbad693f666dd69baeeb58f47518b11c83242e9b8b2c6fb09e1951041af3329a5c6155e3dbce1351eb8faee0819178683d69c0a90ba91a98323bdddcd578ad2960b526e43fee28675b1b02061a1766b008edddb7bca09929d3bcabef59547f026b4c653ee391cadb4b5154f0962a74146df9ba1141235355232fb8173acac5", 0x80, 0x7}, {&(0x7f0000000340)="36bb18489b896b51ca48bb25d8610e6b502b30a0a285f7fdb40f1022d3adfdd0c94e71a960aeec2fe314f72ddf36cc149803a2cb2e2bee51b66fd8182e27b152af6964842585e4f64084ce", 0x4b, 0xfff}], 0x4, &(0x7f0000000480)={[{@utf8no}, {@uni_xlate}, {@shortname_lower}, {@rodir}, {@numtail}], [{@obj_role={'obj_role', 0x3d, '\\\\%'}}]}) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:43 executing program 7: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140)=0x1, 0x4) (fail_nth: 1) 20:31:43 executing program 1: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) (fail_nth: 2) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) 20:31:43 executing program 0: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = accept$inet(0xffffffffffffffff, &(0x7f0000000100)={0x2, 0x0, @loopback}, &(0x7f0000000140)=0x10) ioctl$FS_IOC_ENABLE_VERITY(r0, 0x40806685, &(0x7f0000000240)={0x1, 0x1, 0x1000, 0x64, &(0x7f0000000180)="54092fc3c8ba9b18ab4802071a712452fa70d0f81ceba26137505dce06044fd1ada05356c255b5256fd9b153659e84a09608bf0a0392e13607f5e8d81be6c76697ee9e203e3b16d9ef75f37f23614b688b1d7d4b7b00"/100, 0x1f, 0x0, &(0x7f0000000200)="7c7321355d93eaeb68f0957a8f6e4b5c3708f7f4e3ffffff4000000004dbac"}) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18, r1}, './file0\x00'}) read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:43 executing program 4: clone3(&(0x7f0000000640)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) socketpair$nbd(0x1, 0x1, 0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) ioctl$sock_proto_private(r0, 0x8927, &(0x7f0000000000)="bb100cf27c49a5343d804e58e83a") stat(0x0, 0x0) mount$9p_fd(0x0, 0x0, 0x0, 0x0, 0x0) [ 923.163323] FAULT_INJECTION: forcing a failure. [ 923.163323] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 923.164332] CPU: 1 PID: 10052 Comm: syz-executor.7 Not tainted 5.19.0-rc4-next-20220701 #1 [ 923.165095] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 923.166209] Call Trace: [ 923.166443] [ 923.166704] dump_stack_lvl+0x8b/0xb3 [ 923.167016] should_fail.cold+0x5/0xa [ 923.167309] _copy_from_user+0x2a/0x170 [ 923.167622] udp_lib_setsockopt+0x530/0xc90 [ 923.167949] ? udp_v6_send_skb+0x15b0/0x15b0 [ 923.168290] ? udp4_lib_lookup2.isra.0+0x730/0x730 [ 923.168662] ? __fget_files+0x270/0x440 [ 923.168971] udpv6_setsockopt+0xb4/0xc0 [ 923.169278] ? udp_v6_send_skb+0x15b0/0x15b0 [ 923.169614] __sys_setsockopt+0x180/0x2a0 [ 923.169938] ? sock_common_recvmsg+0x1a0/0x1a0 [ 923.170292] ? __ia32_sys_recv+0x100/0x100 [ 923.170619] ? fput+0x2b/0x190 [ 923.170892] __x64_sys_setsockopt+0xba/0x150 [ 923.171240] ? syscall_enter_from_user_mode+0x1d/0x50 [ 923.171631] do_syscall_64+0x3b/0x90 [ 923.171932] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 923.172319] RIP: 0033:0x7ff49e689b19 [ 923.172607] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 923.173929] RSP: 002b:00007ff49bbff188 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 923.174505] RAX: ffffffffffffffda RBX: 00007ff49e79cf60 RCX: 00007ff49e689b19 [ 923.175055] RDX: 0000000000000068 RSI: 0000000000000011 RDI: 0000000000000003 [ 923.175581] RBP: 00007ff49bbff1d0 R08: 0000000000000004 R09: 0000000000000000 [ 923.176106] R10: 0000000020001140 R11: 0000000000000246 R12: 0000000000000001 [ 923.176626] R13: 00007ffe05eb841f R14: 00007ff49bbff300 R15: 0000000000022000 [ 923.177158] 20:31:43 executing program 5: msgctl$MSG_INFO(0x0, 0xc, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) msgctl$IPC_RMID(0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r0, r1, 0x0, 0x10000027f) msgsnd(0x0, &(0x7f00000017c0)={0x0, "5b478d448fdb800323118682628e9e2a1d67c644aabb1bac31fe4b4f8c4cc772c8365eeb0182485de60739dc53edee01450c623788d60c1127c9d09b88efd6f4cb986e88b586a3cf705cfb4ac7294d62d18fd255cb80e0bab3062d2f0d6e7f2b4edb9bdaed3f2068bcf2f192ccd86f67347a59208e28c68a6b44dff6e0657bc8a0454d725d107929c11b08a29d7210c6724ee17fda811b09a28c200449d76b1e78683bfba8d8c26b044899ea6994fa50b1a1eb8bdc7653c80144344588bf2c22981d02bee81ac64ae8181ec0564a2f163149fe428dc6"}, 0xde, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, &(0x7f0000000200)=ANY=[@ANYBLOB="012aac6cef561324b0bb5d3a", @ANYRES32=r0, @ANYBLOB="0400000000000000"]) 20:31:43 executing program 0: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) getsockopt$inet6_udp_int(r0, 0x11, 0x66, 0x0, &(0x7f0000001a00)) r1 = perf_event_open(0x0, 0x0, 0xc, 0xffffffffffffffff, 0x0) r2 = gettid() capset(&(0x7f0000000700)={0x20080522, r2}, 0x0) r3 = socket$inet(0x2, 0x0, 0x7f) kcmp(0x0, r2, 0x6, r3, r1) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='wchan\x00') socket$netlink(0x10, 0x3, 0x0) read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 20:31:43 executing program 6: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_udp_int(r0, 0x11, 0x68, &(0x7f0000001140), 0x4) [ 923.305024] ------------[ cut here ]------------ [ 923.305854] kernfs_put: syz4/pids.events: released with incorrect active_ref 0 [ 923.306504] WARNING: CPU: 1 PID: 20 at fs/kernfs/dir.c:531 kernfs_put.part.0+0x433/0x540 [ 923.307115] Modules linked in: [ 923.307360] CPU: 1 PID: 20 Comm: kworker/1:0 Not tainted 5.19.0-rc4-next-20220701 #1 [ 923.308020] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 923.308910] Workqueue: events kernfs_notify_workfn [ 923.309291] RIP: 0010:kernfs_put.part.0+0x433/0x540 [ 923.309696] Code: 03 80 3c 18 00 0f 85 ea 00 00 00 4d 8b 7d 38 e8 53 42 a7 ff 48 8b 14 24 44 89 f1 4c 89 fe 48 c7 c7 a0 58 72 84 e8 97 1c 6c 02 <0f> 0b e9 b9 fc ff ff 48 89 ef e8 8e b6 d9 ff e9 c1 fd ff ff e8 84 [ 923.311446] RSP: 0018:ffff8880082c7bd8 EFLAGS: 00010286 [ 923.311887] RAX: 0000000000000000 RBX: dffffc0000000000 RCX: 0000000000000000 [ 923.312447] RDX: ffff8880082b8000 RSI: ffffffff812b6848 RDI: ffffed1001058f6d [ 923.312981] RBP: ffff88800e656690 R08: 0000000000000005 R09: 0000000000000000 [ 923.313545] R10: 0000000080000000 R11: 0000000000000001 R12: ffff88800e656658 [ 923.314077] R13: ffff88800e3fc9f8 R14: 0000000000000000 R15: ffff88800df54cf8 [ 923.314760] FS: 0000000000000000(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 923.315800] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 923.316585] CR2: 00007f5079e80d60 CR3: 0000000045ec8000 CR4: 0000000000350ee0 [ 923.317128] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 923.317688] DR3: 0000000000000000 DR6: 00000000ffff4ff0 DR7: 0000000000000400 [ 923.318236] Call Trace: [ 923.318460] [ 923.318658] kernfs_put+0x42/0x50 [ 923.318942] kernfs_notify_workfn+0x417/0x560 [ 923.319297] ? lock_downgrade+0x6d0/0x6d0 [ 923.319651] ? kernfs_vma_page_mkwrite+0x230/0x230 [ 923.320037] ? lock_is_held_type+0xd7/0x130 [ 923.320373] process_one_work+0xa0f/0x1690 [ 923.320731] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 923.321089] ? rwlock_bug.part.0+0x90/0x90 [ 923.321411] ? _raw_spin_lock_irq+0x41/0x50 [ 923.321760] worker_thread+0x637/0x1250 [ 923.322074] ? process_one_work+0x1690/0x1690 [ 923.322414] kthread+0x2ed/0x3a0 [ 923.322699] ? kthread_complete_and_exit+0x40/0x40 [ 923.323087] ret_from_fork+0x22/0x30 [ 923.323384] [ 923.323579] irq event stamp: 588905 [ 923.323853] hardirqs last enabled at (588915): [] __up_console_sem+0x78/0x80 [ 923.324510] hardirqs last disabled at (588926): [] __up_console_sem+0x5d/0x80 [ 923.325156] softirqs last enabled at (588532): [] __irq_exit_rcu+0x113/0x170 [ 923.325829] softirqs last disabled at (588467): [] __irq_exit_rcu+0x113/0x170 [ 923.326505] ---[ end trace 0000000000000000 ]--- [ 923.326967] ================================================================== [ 923.327494] BUG: KASAN: use-after-free in llist_del_first+0x89/0xa0 [ 923.327976] Read of size 8 at addr ffff88800e6566d8 by task kworker/1:0/20 [ 923.328482] [ 923.328614] CPU: 1 PID: 20 Comm: kworker/1:0 Tainted: G W 5.19.0-rc4-next-20220701 #1 [ 923.329297] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 923.330131] Workqueue: events kernfs_notify_workfn [ 923.330503] Call Trace: [ 923.330695] [ 923.330868] dump_stack_lvl+0x8b/0xb3 [ 923.331170] print_report.cold+0x5e/0x5e1 [ 923.331487] ? llist_del_first+0x89/0xa0 [ 923.331797] kasan_report+0xb1/0x1b0 [ 923.332091] ? llist_del_first+0x89/0xa0 [ 923.332403] llist_del_first+0x89/0xa0 [ 923.332702] kernfs_notify_workfn+0x78/0x560 [ 923.333030] ? lock_downgrade+0x6d0/0x6d0 [ 923.333361] ? kernfs_vma_page_mkwrite+0x230/0x230 [ 923.333949] ? lock_is_held_type+0xd7/0x130 [ 923.334066] ------------[ cut here ]------------ [ 923.334343] process_one_work+0xa0f/0x1690 [ 923.334363] ? pwq_dec_nr_in_flight+0x2a0/0x2a0 [ 923.334380] ? rwlock_bug.part.0+0x90/0x90 [ 923.335201] WARNING: CPU: 0 PID: 10056 at fs/kernfs/dir.c:504 kernfs_get.part.0+0x69/0x80 [ 923.335501] ? _raw_spin_lock_irq+0x41/0x50 [ 923.336119] Modules linked in: [ 923.336424] worker_thread+0x637/0x1250 [ 923.337489] [ 923.337797] ? process_one_work+0x1690/0x1690 [ 923.338223] CPU: 0 PID: 10056 Comm: syz-executor.4 Tainted: G W 5.19.0-rc4-next-20220701 #1 [ 923.338508] kthread+0x2ed/0x3a0 [ 923.338736] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 923.339070] ? kthread_complete_and_exit+0x40/0x40 [ 923.340331] RIP: 0010:kernfs_get.part.0+0x69/0x80 [ 923.340568] ret_from_fork+0x22/0x30 [ 923.342065] Code: 31 ff 89 ee e8 a8 43 a7 ff 85 ed 74 18 e8 cf 46 a7 ff be 04 00 00 00 48 89 df e8 52 be d9 ff f0 ff 03 5b 5d c3 e8 b7 46 a7 ff <0f> 0b eb df 48 89 df e8 fb ba d9 ff eb c6 66 0f 1f 84 00 00 00 00 [ 923.342418] [ 923.343061] RSP: 0018:ffff88804735fa40 EFLAGS: 00010093 [ 923.343329] [ 923.343333] Allocated by task 297: [ 923.345738] [ 923.345907] kasan_save_stack+0x1e/0x40 [ 923.346602] RAX: 0000000000000000 RBX: ffff88800e656658 RCX: 0000000000000000 [ 923.346728] __kasan_slab_alloc+0x66/0x80 [ 923.347209] RDX: ffff888045a33580 RSI: ffffffff819d2579 RDI: 0000000000000005 [ 923.347337] kmem_cache_alloc+0x1b1/0x490 [ 923.347855] RBP: 0000000000000000 R08: 0000000000000005 R09: 0000000000000000 [ 923.348373] __kernfs_new_node+0xd4/0x8b0 [ 923.348919] R10: 0000000000000000 R11: 0000000000000001 R12: 0000000000000001 [ 923.349434] kernfs_new_node+0x93/0x120 [ 923.349973] R13: 1ffffffff0a01e40 R14: ffff88800e656658 R15: ffff88800cc7e530 [ 923.350482] __kernfs_create_file+0x51/0x350 [ 923.351033] FS: 0000555555c11400(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 923.351540] cgroup_addrm_files+0x3e2/0x9d0 [ 923.352066] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 923.352573] css_populate_dir+0x19b/0x450 [ 923.353158] CR2: 00007fd64d69a718 CR3: 0000000044f4a000 CR4: 0000000000350ef0 [ 923.353735] cgroup_apply_control_enable+0x3ae/0xa40 [ 923.354302] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 923.354715] cgroup_mkdir+0x824/0x11f0 [ 923.355271] DR3: 0000000000000000 DR6: 00000000ffff4ff0 DR7: 0000000000000400 [ 923.355792] kernfs_iop_mkdir+0x149/0x1d0 [ 923.356458] Call Trace: [ 923.356969] vfs_mkdir+0x417/0x6a0 [ 923.357483] [ 923.358008] do_mkdirat+0x17b/0x2e0 [ 923.358556] kernfs_get+0x1b/0x30 [ 923.358739] __x64_sys_mkdir+0xf2/0x140 [ 923.359219] kernfs_notify+0x180/0x350 [ 923.359621] do_syscall_64+0x3b/0x90 [ 923.360104] cgroup_file_notify+0xf5/0x1a0 [ 923.360653] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 923.361184] pids_can_fork+0x22f/0x370 [ 923.361805] [ 923.361811] Freed by task 20: [ 923.362298] ? pids_cancel_fork+0x200/0x200 [ 923.363001] kasan_save_stack+0x1e/0x40 [ 923.363683] cgroup_can_fork+0x332/0x11b0 [ 923.364281] kasan_set_track+0x21/0x30 [ 923.364525] copy_process+0x4023/0x6d60 [ 923.364994] kasan_set_free_info+0x20/0x30 [ 923.365596] ? __cleanup_sighand+0xb0/0xb0 [ 923.366162] __kasan_slab_free+0x108/0x190 [ 923.366735] kernel_clone+0xe7/0xa60 [ 923.367297] kmem_cache_free+0xfb/0x600 [ 923.367828] ? create_io_thread+0xe0/0xe0 [ 923.368462] kernfs_put.part.0+0x2c7/0x540 [ 923.369015] ? hrtimer_nanosleep+0x27e/0x6b0 [ 923.369650] kernfs_put+0x42/0x50 [ 923.370150] ? nanosleep_copyout+0x100/0x100 [ 923.370743] kernfs_notify_workfn+0x417/0x560 [ 923.371298] ? __hrtimer_init+0x260/0x260 [ 923.371910] process_one_work+0xa0f/0x1690 [ 923.372501] __do_sys_clone+0xba/0x100 [ 923.373013] worker_thread+0x637/0x1250 [ 923.373606] ? __do_sys_vfork+0xc0/0xc0 [ 923.374283] kthread+0x2ed/0x3a0 [ 923.374849] ? syscall_enter_from_user_mode+0x1d/0x50 [ 923.375480] ret_from_fork+0x22/0x30 [ 923.375997] ? syscall_enter_from_user_mode+0x1d/0x50 [ 923.376602] [ 923.376607] The buggy address belongs to the object at ffff88800e656658 [ 923.376607] which belongs to the cache kernfs_node_cache of size 168 [ 923.377134] do_syscall_64+0x3b/0x90 [ 923.377645] The buggy address is located 128 bytes inside of [ 923.377645] 168-byte region [ffff88800e656658, ffff88800e656700) [ 923.378324] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 923.378893] [ 923.378898] The buggy address belongs to the physical page: [ 923.379658] RIP: 0033:0x7f7058becf41 [ 923.379924] page:00000000e1e486cc refcount:1 mapcount:0 mapping:0000000000000000 index:0x0 pfn:0xe656 [ 923.381829] Code: 48 85 ff 74 3d 48 85 f6 74 38 48 83 ee 10 48 89 4e 08 48 89 3e 48 89 d7 4c 89 c2 4d 89 c8 4c 8b 54 24 08 b8 38 00 00 00 0f 05 <48> 85 c0 7c 13 74 01 c3 31 ed 58 5f ff d0 48 89 c7 b8 3c 00 00 00 [ 923.382396] flags: 0x100000000000200(slab|node=0|zone=1) [ 923.384037] RSP: 002b:00007ffc70e7c958 EFLAGS: 00000206 [ 923.384771] raw: 0100000000000200 0000000000000000 dead000000000001 ffff8880080718c0 [ 923.384988] ORIG_RAX: 0000000000000038 [ 923.385793] raw: 0000000000000000 0000000000110011 00000001ffffffff 0000000000000000 [ 923.386267] RAX: ffffffffffffffda RBX: 00007f7056140700 RCX: 00007f7058becf41 [ 923.387555] page dumped because: kasan: bad access detected [ 923.389939] RDX: 00007f70561409d0 RSI: 00007f70561402f0 RDI: 00000000003d0f00 [ 923.390706] [ 923.390710] Memory state around the buggy address: [ 923.391401] RBP: 00007ffc70e7cb90 R08: 00007f7056140700 R09: 00007f7056140700 [ 923.392479] ffff88800e656580: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 [ 923.392994] R10: 00007f70561409d0 R11: 0000000000000206 R12: 00007ffc70e7ca0e [ 923.394057] ffff88800e656600: 00 00 00 fc fc fc fc fc fc fc fc fa fb fb fb fb [ 923.394993] R13: 00007ffc70e7ca0f R14: 00007f7056140300 R15: 0000555555c12d50 [ 923.395797] >ffff88800e656680: fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb fb [ 923.396749] [ 923.396965] ^ [ 923.397600] irq event stamp: 4626 [ 923.398550] ffff88800e656700: fc fc fc fc fc fc fc fc 00 00 00 00 00 00 00 00 [ 923.399497] hardirqs last enabled at (4625): [] _raw_spin_unlock_irq+0x1f/0x40 [ 923.400510] ffff88800e656780: 00 00 00 00 00 00 00 00 00 00 00 00 00 fc fc fc [ 923.401448] hardirqs last disabled at (4626): [] _raw_spin_lock_irqsave+0x4e/0x50 [ 923.402455] ================================================================== [ 923.403413] softirqs last enabled at (4604): [] fpu_clone+0x3be/0xb00 [ 923.403792] Disabling lock debugging due to kernel taint [ 923.404549] softirqs last disabled at (4602): [] fpu_clone+0x331/0xb00 [ 923.413594] ---[ end trace 0000000000000000 ]--- [ 932.891120] kmemleak: 9 new suspected memory leaks (see /sys/kernel/debug/kmemleak) VM DIAGNOSIS: 20:31:44 Registers: info registers vcpu 0 RAX=0000000000000246 RBX=0000000000000000 RCX=0000000000000001 RDX=0000000000000000 RSI=0000000000000000 RDI=ffff888046311eb4 RBP=ffffffff84e87cd6 RSP=ffff888045d4fc30 R8 =0000000000000000 R9 =0000000000000000 R10=0000000000000001 R11=0000000000000001 R12=0000000000000112 R13=0000000000000000 R14=ffff888046311ac0 R15=0000000000092cc0 RIP=ffffffff811f872d RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007efe5f994540 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000555a7502e4c8 CR3=000000000ce9e000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 00642e65626f7270 646f6d2f6374652f YMM01=0000000000000000 0000000000000000 00642e65626f7270 646f6d2f6374652f YMM02=0000000000000000 0000000000000000 0000000000000000 0000ffffffffffff YMM03=0000000000000000 0000000000000000 0000000000000000 0000ff00000000ff YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 676f6c206d6f7473 7563000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000043 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff8240c491 RDI=ffffffff873e26a0 RBP=ffffffff873e2660 RSP=ffff8880082c7570 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000043 R11=0000000000000001 R12=0000000000000043 R13=ffffffff873e2660 R14=0000000000000010 R15=ffffffff8240c480 RIP=ffffffff8240c4e9 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f5079e80d60 CR3=0000000045ec8000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 ffffffffffffffff ffffffffffffffff YMM02=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 0000000000000000 00000000000000ff YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000