, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x4000)=nil) dup3(r2, r3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000140)=0xe65) shmget(0x1, 0x3000, 0x54000000, &(0x7f0000fef000/0x3000)=nil) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsmount(r4, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7f, 0x9a, 0x1, 0xb9, 0x0, 0x2, 0xa, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000100), 0x1}, 0xa1, 0x3f, 0x4, 0x9, 0x8, 0x7fff, 0x80, 0x0, 0x80000001, 0x0, 0x401}, 0x0, 0x4, 0xffffffffffffffff, 0x1) mremap(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) [ 1804.960122] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.962835] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.968842] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef", 0x3a, 0x400}, {&(0x7f0000010400)="0200000003", 0x5, 0x800}], 0x0, &(0x7f0000012c00)) [ 1804.973801] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.976208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.979038] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.979992] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.980942] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.982959] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.984024] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.985036] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.985987] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.986877] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.987820] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.989165] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.990136] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.991932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.992973] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.994151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.995151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.996073] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1804.997022] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.001947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.003097] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.005186] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.006221] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.007578] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.008272] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.008935] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.010036] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.011461] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1805.012979] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:37 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5412, 0xfffffffffffffffd) 03:33:37 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000001240)='ns\x00') getdents(r0, &(0x7f0000000000)=""/74, 0x18) getdents64(r0, &(0x7f0000000100)=""/4096, 0x1000) 03:33:37 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) fcntl$setstatus(r0, 0x4, 0x2800) syz_genetlink_get_family_id$ethtool(&(0x7f0000000000), r0) 03:33:37 executing program 1: openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x96000, 0x4) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) pwritev(0xffffffffffffffff, &(0x7f00000000c0)=[{0x0}], 0x1, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000080)='./file1\x00', 0x0, 0x0) fgetxattr(r1, &(0x7f0000000180)=@known='user.incfs.size\x00', &(0x7f00000003c0)=""/160, 0xa0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) open_tree(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x80000) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000200)=ANY=[@ANYBLOB="010000030000000000", @ANYRES32=r0]) openat$hwrng(0xffffffffffffff9c, &(0x7f00000001c0), 0x8000, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x203}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) [ 1805.287977] syz-executor.0: attempt to access beyond end of device [ 1805.287977] loop0: rw=2049, sector=40, nr_sectors = 4 limit=40 03:33:38 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3b, 0x0, @perf_config_ext, 0x200, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x8}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fsopen(0x0, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = fsopen(&(0x7f0000000200)='devpts\x00', 0x0) r2 = openat$incfs(0xffffffffffffff9c, &(0x7f0000000040)='.pending_reads\x00', 0x141142, 0x0) sendfile(r1, r2, 0x0, 0x2) mmap$perf(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x3000007, 0x10010, 0xffffffffffffffff, 0x3) r3 = dup(r0) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, 0x0, 0x0, 0x0) socket$inet6(0xa, 0x1, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000001c0)={0xa, 0x4e23, 0x0, @remote}, 0x1c) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(r3, 0xc0189379, &(0x7f0000000000)={{0x1, 0x1, 0x18}, '.\x00'}) dup2(0xffffffffffffffff, 0xffffffffffffffff) 03:33:38 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5412, 0xfffffffffffffffd) 03:33:38 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 03:33:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 03:33:38 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, 0xfffffffffffffffe) 03:33:38 executing program 5: mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0xaf9e927a7dda9c84, &(0x7f0000ff4000/0x4000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x82}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x4000)=nil) dup3(r2, r3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000140)=0xe65) shmget(0x1, 0x3000, 0x54000000, &(0x7f0000fef000/0x3000)=nil) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsmount(r4, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7f, 0x9a, 0x1, 0xb9, 0x0, 0x2, 0xa, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000100), 0x1}, 0xa1, 0x3f, 0x4, 0x9, 0x8, 0x7fff, 0x80, 0x0, 0x80000001, 0x0, 0x401}, 0x0, 0x4, 0xffffffffffffffff, 0x1) mremap(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) [ 1805.782653] loop0: detected capacity change from 0 to 40 03:33:38 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x401a012, r0, 0x0) 03:33:38 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$cgroup2(0x0, &(0x7f0000000380)='./file0\x00', &(0x7f00000003c0), 0x0, 0x0) stat(&(0x7f0000000000)='./file0/../file0\x00', &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) lchown(&(0x7f0000000040)='./file0\x00', 0x0, 0x0) 03:33:38 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, 0xfffffffffffffffe) 03:33:38 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x401a012, r0, 0x0) 03:33:38 executing program 6: socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$sock_TIOCINQ(r0, 0x541b, 0xfffffffffffffffe) 03:33:38 executing program 2: syz_emit_ethernet(0x2a, &(0x7f0000000540)={@multicast, @link_local, @void, {@arp={0x806, @ether_ipv4={0x2, 0x800, 0x6, 0x4, 0x0, @dev, @rand_addr, @empty, @local}}}}, 0x0) 03:33:38 executing program 7: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5412, 0xfffffffffffffffd) [ 1805.981707] syz-executor.0: attempt to access beyond end of device [ 1805.981707] loop0: rw=2049, sector=40, nr_sectors = 4 limit=40 03:33:38 executing program 6: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsmount(0xffffffffffffffff, 0x1, 0x1) perf_event_open(0x0, 0x0, 0x6, r0, 0x8) write$binfmt_script(0xffffffffffffffff, 0x0, 0xb) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc796, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x2}, 0x0, 0x0, 0x0, 0x4, 0x0, 0xffffffe0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r1, 0x1276, 0x0) 03:33:38 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x401a012, r0, 0x0) 03:33:38 executing program 0: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 03:33:38 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_mr_cache\x00') pread64(r0, &(0x7f0000000080)=""/54, 0x36, 0x6f) 03:33:38 executing program 5: mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0xaf9e927a7dda9c84, &(0x7f0000ff4000/0x4000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x82}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x4000)=nil) dup3(r2, r3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000140)=0xe65) shmget(0x1, 0x3000, 0x54000000, &(0x7f0000fef000/0x3000)=nil) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsmount(r4, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7f, 0x9a, 0x1, 0xb9, 0x0, 0x2, 0xa, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000100), 0x1}, 0xa1, 0x3f, 0x4, 0x9, 0x8, 0x7fff, 0x80, 0x0, 0x80000001, 0x0, 0x401}, 0x0, 0x4, 0xffffffffffffffff, 0x1) mremap(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) [ 1806.202061] loop0: detected capacity change from 0 to 40 [ 1806.352308] syz-executor.0: attempt to access beyond end of device [ 1806.352308] loop0: rw=2049, sector=40, nr_sectors = 4 limit=40 03:33:39 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x40, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x3d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x1000002, 0x401a012, r0, 0x0) 03:33:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x5, @perf_config_ext={0x0, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 03:33:39 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x581c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400)=""/141, &(0x7f00000004c0)=0x8d) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r0, &(0x7f0000000080)="01", 0x292e9) 03:33:39 executing program 5: mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) mremap(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x4000, 0xaf9e927a7dda9c84, &(0x7f0000ff4000/0x4000)=nil) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2000000000000000}, 0x82}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) r2 = perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r3 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/asound/seq/clients\x00', 0x0, 0x0) prctl$PR_SET_MM(0x23, 0x5, &(0x7f0000ffa000/0x4000)=nil) dup3(r2, r3, 0x0) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, &(0x7f0000000140)=0xe65) shmget(0x1, 0x3000, 0x54000000, &(0x7f0000fef000/0x3000)=nil) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r4 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r4, 0x6, 0x0, 0x0, 0x0) fsmount(r4, 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x7f, 0x9a, 0x1, 0xb9, 0x0, 0x2, 0xa, 0xd, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x6, 0x3, @perf_bp={&(0x7f0000000100), 0x1}, 0xa1, 0x3f, 0x4, 0x9, 0x8, 0x7fff, 0x80, 0x0, 0x80000001, 0x0, 0x401}, 0x0, 0x4, 0xffffffffffffffff, 0x1) mremap(&(0x7f0000ff2000/0x3000)=nil, 0x3000, 0x3000, 0x2, &(0x7f0000ffc000/0x3000)=nil) 03:33:39 executing program 4: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$VFAT_IOCTL_READDIR_SHORT(0xffffffffffffffff, 0x82307202, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0xf, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat(0xffffffffffffffff, 0x0, 0x0, 0x0) write$binfmt_aout(r1, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) stat(&(0x7f00000001c0)='./file0\x00', 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x40}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) 03:33:39 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f00000000c0)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x1) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) pwrite64(r2, &(0x7f0000000140)="c0", 0x1, 0x0) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000200)={0x0, r2, 0xff, 0x8}) 03:33:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_mr_cache\x00') pread64(r0, &(0x7f0000000080)=""/54, 0x36, 0x6f) 03:33:39 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f0000000200)='tracefs\x00', 0x0, &(0x7f0000000240)='\"rans=fd,') 03:33:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_mr_cache\x00') pread64(r0, &(0x7f0000000080)=""/54, 0x36, 0x6f) [ 1806.767316] No source specified 03:33:39 executing program 6: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$netlink(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f0000002840)=[{&(0x7f0000002440)={0xb8, 0x19, 0x1, 0x0, 0x0, "", [@nested={0xa5, 0x0, 0x0, 0x1, [@generic="87aced5d22fe5618764a16d1740b983cd3dcacf41ca81f4017550771e543045ea6b46c02ee4f6c33061ba5aa1686ed4611377d0ee5de1b018c3382191beb9c754fb8d13fa0a30e9ac5d5c23ec11608c1213a3ca8e982f0096ceacce153f7841aba03cb61ed5878ac115861837189435ec20366d8754dad864078c00203470609bcecdc55a7e65623e7e5653f711fdc0848d7e5366c2d07a84d04fdfe02c2f21c03"]}]}, 0xb8}], 0x1}, 0x0) [ 1806.818971] No source specified 03:33:39 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xed7}, 0x9100}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGPGRP(0xffffffffffffffff, 0x540f, &(0x7f0000000040)) clone3(&(0x7f0000005680)={0xa000000, &(0x7f0000000180), 0x0, &(0x7f0000000240), {0x23}, 0x0, 0x0, &(0x7f00000006c0)=""/167, &(0x7f0000005640)=[0x0, 0x0], 0x2}, 0x58) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:39 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x5, @perf_config_ext={0x0, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 03:33:39 executing program 3: r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000180)='net/ip_mr_cache\x00') pread64(r0, &(0x7f0000000080)=""/54, 0x36, 0x6f) 03:33:39 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x5, @perf_config_ext={0x0, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 03:33:39 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mq_open(&(0x7f0000000000)='}\x8d][.$^k}+\\!-)\x00', 0x40, 0x0, &(0x7f0000000100)={0x2, 0x7, 0x7ff}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x7fffffff, 0xfffffffffffffff9, 0x8, 0x2}) ioctl$CDROMVOLCTRL(r1, 0x530a, 0x0) [ 1807.169111] No source specified [ 1807.183058] No source specified 03:33:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x5, @perf_config_ext={0x0, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 03:33:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000240)="06", 0x1}], 0x1, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r1, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}], 0x1, 0x8001, 0x0) r2 = dup(r0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x2, 0x0) pwrite64(r3, &(0x7f00000000c0)='9', 0x1, 0x8040000) r4 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) sendfile(r3, r4, 0x0, 0xffff) dup3(r2, r4, 0x0) 03:33:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x581c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400)=""/141, &(0x7f00000004c0)=0x8d) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r0, &(0x7f0000000080)="01", 0x292e9) 03:33:40 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x5, @perf_config_ext={0x0, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 03:33:40 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x8, 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'macvtap0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000002640)={@loopback, r1}, 0x14) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000500)=ANY=[@ANYBLOB="01000000010004001800000020c9ce0fd2a8a03fdc8e255809340400da75a2ddccd2f777f6c605132cd68b6faf7ef6ba888b68ab96fcb81629d4b187ac18adc7670e02229b473a66cbaf2f6e0f526cc12f103842774c92d8b3c052851e99b98b8709860bdb36310aabe3ed2204e0127d48f6947a343c6bd6d5e09cccb2d42de48e068e64bd545bb640ff7ac933a8d25fd7a3573014704031fe2f44e8c206fbe558cafe3a45f9cc1922f27686b77cabc5204def6922", @ANYRES32=0xffffffffffffffff, @ANYBLOB="a4e8907393afd314e0caf58836b5af2b6292d7e5a9a8e3d7accd9b07187c6ccb0f1263d458f7e50eb2a1cfd192166062df304206de605b95cf42aea47d90b0778a3ab0a41ec456d05617b9f2ebd534f4f062a309de3bfdeed992d69df8"]) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, 0xffffffffffffffff, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mq_open(&(0x7f0000000000)='}\x8d][.$^k}+\\!-)\x00', 0x40, 0x0, &(0x7f0000000100)={0x2, 0x7, 0x7ff}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x7fffffff, 0xfffffffffffffff9, 0x8, 0x2}) ioctl$CDROMVOLCTRL(r1, 0x530a, 0x0) 03:33:40 executing program 4: timer_create(0x3, 0x0, &(0x7f0000000500)) timer_settime(0x0, 0x0, &(0x7f0000000700)={{0x0, 0x3938700}, {0x77359400}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000700)={{0x0, 0x3938700}, {0x77359400}}, 0x0) timer_delete(0x0) 03:33:40 executing program 3: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) getsockopt$sock_cred(r0, 0x1, 0x11, &(0x7f0000000180), &(0x7f00000000c0)=0x65) 03:33:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mq_open(&(0x7f0000000000)='}\x8d][.$^k}+\\!-)\x00', 0x40, 0x0, &(0x7f0000000100)={0x2, 0x7, 0x7ff}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x7fffffff, 0xfffffffffffffff9, 0x8, 0x2}) ioctl$CDROMVOLCTRL(r1, 0x530a, 0x0) [ 1807.783361] No source specified 03:33:40 executing program 4: r0 = fsopen(&(0x7f0000000080)='mqueue\x00', 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, 0xfffffffffffffffe, 0x0, 0x0) 03:33:40 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0xf}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) [ 1807.846045] No source specified 03:33:40 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000500)=[{&(0x7f0000000380)=""/46, 0x2e}], 0x1, 0x0, 0x0) ioctl$SG_SET_COMMAND_Q(r0, 0x2271, &(0x7f0000000140)) close(r0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x1}, 0x25, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) r2 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(r1, 0xc0189374, &(0x7f0000000000)={{0x1, 0x1, 0x18, r2, {0x5}}, './file0\x00'}) r3 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000240), 0x404200, 0x0) ioctl$SG_SET_COMMAND_Q(r3, 0x2271, &(0x7f0000000300)) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x2}) perf_event_open(&(0x7f00000001c0)={0x0, 0x80, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, @perf_config_ext={0x6}, 0x43820, 0x0, 0x0, 0x4, 0x0, 0x0, 0x101, 0x0, 0x3, 0x0, 0x800}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) 03:33:40 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x5, @perf_config_ext={0x0, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 03:33:40 executing program 4: ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0x0) r0 = socket$inet6(0xa, 0x3, 0xff) connect$inet6(r0, &(0x7f0000000040)={0xa, 0x0, 0x0, @empty}, 0x1c) sendmmsg(r0, &(0x7f0000000c00)=[{{0x0, 0x0, 0x0}}], 0x1, 0x810) syz_open_dev$tty1(0xc, 0x4, 0x1) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:40 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) mq_open(&(0x7f0000000000)='}\x8d][.$^k}+\\!-)\x00', 0x40, 0x0, &(0x7f0000000100)={0x2, 0x7, 0x7ff}) ioctl$EXT4_IOC_MOVE_EXT(r1, 0xc028660f, &(0x7f0000000180)={0x0, 0xffffffffffffffff, 0x7fffffff, 0xfffffffffffffff9, 0x8, 0x2}) ioctl$CDROMVOLCTRL(r1, 0x530a, 0x0) 03:33:40 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x581c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400)=""/141, &(0x7f00000004c0)=0x8d) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r0, &(0x7f0000000080)="01", 0x292e9) 03:33:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0xf}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) [ 1808.263224] No source specified 03:33:41 executing program 6: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$ieee802154(&(0x7f0000000ac0), r0) sendmsg$IEEE802154_SET_MACPARAMS(r1, &(0x7f0000000b80)={0x0, 0x0, &(0x7f0000000b40)={&(0x7f0000000b00)={0x24, r2, 0x1, 0x0, 0x0, {}, [@IEEE802154_ATTR_CSMA_MAX_BE={0x5}, @IEEE802154_ATTR_CSMA_MIN_BE={0x5}]}, 0x24}}, 0x0) 03:33:41 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000180), 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000001, 0x5, @perf_config_ext={0x0, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) 03:33:41 executing program 2: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) getsockopt$inet6_tcp_int(r0, 0x6, 0x0, 0x0, &(0x7f0000001fc0)) 03:33:41 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_group_source_req(r0, 0x0, 0x2e, &(0x7f0000004b80)={0x1, {{0x2, 0x0, @multicast1}}, {{0x2, 0x0, @private}}}, 0x108) 03:33:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0xf}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 03:33:41 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x8, 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'macvtap0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000002640)={@loopback, r1}, 0x14) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000500)=ANY=[@ANYBLOB="01000000010004001800000020c9ce0fd2a8a03fdc8e255809340400da75a2ddccd2f777f6c605132cd68b6faf7ef6ba888b68ab96fcb81629d4b187ac18adc7670e02229b473a66cbaf2f6e0f526cc12f103842774c92d8b3c052851e99b98b8709860bdb36310aabe3ed2204e0127d48f6947a343c6bd6d5e09cccb2d42de48e068e64bd545bb640ff7ac933a8d25fd7a3573014704031fe2f44e8c206fbe558cafe3a45f9cc1922f27686b77cabc5204def6922", @ANYRES32=0xffffffffffffffff, @ANYBLOB="a4e8907393afd314e0caf58836b5af2b6292d7e5a9a8e3d7accd9b07187c6ccb0f1263d458f7e50eb2a1cfd192166062df304206de605b95cf42aea47d90b0778a3ab0a41ec456d05617b9f2ebd534f4f062a309de3bfdeed992d69df8"]) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, 0xffffffffffffffff, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:41 executing program 6: openat(0xffffffffffffff9c, &(0x7f00000014c0)='./file0\x00', 0x26e1, 0x0) r0 = signalfd4(0xffffffffffffffff, &(0x7f0000000140), 0x8, 0x0) r1 = eventfd2(0x0, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', &(0x7f00000000c0), 0x0, &(0x7f0000000180)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}}) 03:33:41 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000000)='net/tcp\x00') pread64(r0, &(0x7f0000000100)=""/150, 0x96, 0x96) ioctl$AUTOFS_DEV_IOCTL_ISMOUNTPOINT(r0, 0xc018937e, 0x0) io_submit(0x0, 0x0, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x96) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r0, 0x2405, 0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) socket$packet(0x11, 0x0, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'sit0\x00'}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) pwritev(0xffffffffffffffff, &(0x7f0000003940)=[{0x0}, {0x0}], 0x2, 0x5, 0x3) 03:33:41 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0x3}, 0x581c1}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x7, &(0x7f0000000400)=""/141, &(0x7f00000004c0)=0x8d) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$nl_xfrm(0x10, 0x3, 0x6) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r0, &(0x7f0000000080)="01", 0x292e9) [ 1808.814575] kernel write not supported for file [eventfd] (pid: 345679 comm: kworker/0:2) 03:33:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000300)=[{0x6}]}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000040)) recvmsg$unix(r1, &(0x7f0000000200)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/50, 0x32}], 0x1}, 0x2000) 03:33:41 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_PAUSE_SET(r0, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000140)={&(0x7f0000000080)={0x18, r1, 0x301, 0x0, 0x0, {0xf}, [@ETHTOOL_A_PAUSE_HEADER={0x4}]}, 0x18}}, 0x0) 03:33:41 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x3, 0x0) getsockopt$bt_BT_DEFER_SETUP(r0, 0x112, 0x7, 0x0, &(0x7f0000000200)) 03:33:41 executing program 0: clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0)=0xffffffffffffffff, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) poll(&(0x7f0000000040)=[{r0}], 0x1, 0x80) 03:33:41 executing program 6: syz_emit_ethernet(0x66, &(0x7f00000003c0)=ANY=[@ANYBLOB="aaaaaaaaaaaabbbbbbbbbbbb86dd602ddc00000000f300000000fe8000000000000000000000000000c8020090780000000060f2e2a600000000ff"], 0x0) [ 1809.026289] No source specified 03:33:41 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x18, 0x0, 0x101, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) clone3(0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[0x0, 0x0, r2], 0x3}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:41 executing program 4: r0 = syz_io_uring_setup(0x309e, &(0x7f0000002680)={0x0, 0x0, 0x1}, &(0x7f0000ff9000/0x2000)=nil, &(0x7f0000ffa000/0x2000)=nil, &(0x7f0000002700), &(0x7f0000002740)) io_uring_register$IORING_REGISTER_BUFFERS(r0, 0x0, &(0x7f00000025c0)=[{&(0x7f0000000100)=""/111, 0x6f}, {&(0x7f0000000500)=""/4096, 0x1050}, {&(0x7f0000000180)=""/72, 0x48}, {&(0x7f0000001500)=""/4081, 0x1000}, {&(0x7f0000002500)=""/141, 0x9c}], 0x9b) 03:33:41 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000300)=[{0x6}]}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000040)) recvmsg$unix(r1, &(0x7f0000000200)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/50, 0x32}], 0x1}, 0x2000) 03:33:42 executing program 0: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x18, 0x0, 0x101, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) clone3(0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[0x0, 0x0, r2], 0x3}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x40030000000000) 03:33:42 executing program 6: mkdir(&(0x7f0000000000)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = inotify_init() inotify_add_watch(r1, &(0x7f0000000000)='./file0\x00', 0xd4000f49) 03:33:42 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x18, 0x0, 0x101, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) clone3(0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[0x0, 0x0, r2], 0x3}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:42 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x8, 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'macvtap0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000002640)={@loopback, r1}, 0x14) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000500)=ANY=[@ANYBLOB="01000000010004001800000020c9ce0fd2a8a03fdc8e255809340400da75a2ddccd2f777f6c605132cd68b6faf7ef6ba888b68ab96fcb81629d4b187ac18adc7670e02229b473a66cbaf2f6e0f526cc12f103842774c92d8b3c052851e99b98b8709860bdb36310aabe3ed2204e0127d48f6947a343c6bd6d5e09cccb2d42de48e068e64bd545bb640ff7ac933a8d25fd7a3573014704031fe2f44e8c206fbe558cafe3a45f9cc1922f27686b77cabc5204def6922", @ANYRES32=0xffffffffffffffff, @ANYBLOB="a4e8907393afd314e0caf58836b5af2b6292d7e5a9a8e3d7accd9b07187c6ccb0f1263d458f7e50eb2a1cfd192166062df304206de605b95cf42aea47d90b0778a3ab0a41ec456d05617b9f2ebd534f4f062a309de3bfdeed992d69df8"]) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, 0xffffffffffffffff, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000300)=[{0x6}]}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000040)) recvmsg$unix(r1, &(0x7f0000000200)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/50, 0x32}], 0x1}, 0x2000) 03:33:42 executing program 7: pkey_alloc(0x0, 0x5) 03:33:42 executing program 1: prlimit64(0x0, 0x8, &(0x7f0000000040), 0x0) mlock2(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x0) 03:33:42 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x2}, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0xff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) shmat(0x0, &(0x7f0000ff0000/0x3000)=nil, 0x4000) shmctl$IPC_RMID(0x0, 0x0) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x80010, 0xffffffffffffffff, 0x5) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r1, 0x40089413, 0x0) ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) r3 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(0xffffffffffffffff, 0x0, 0x78) mkdirat(r4, &(0x7f0000000040)='./file0\x00', 0x0) ioctl$LOOP_CTL_REMOVE(r4, 0x4c81, 0x0) ioctl$TIOCL_SETSEL(r0, 0x541c, &(0x7f0000000100)={0x2, {0x2, 0x8001, 0x7, 0x6, 0x7fff, 0x1f}}) 03:33:42 executing program 2: socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockname(r0, 0x0, &(0x7f0000000c00)) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000080)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0xee01, 0xee01}}, './file0\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r2, 0x1, 0x1a, &(0x7f0000000080)={0x1, &(0x7f0000000300)=[{0x6}]}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, 0xffffffffffffffff, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(r3, 0xf, &(0x7f0000000040)) recvmsg$unix(r1, &(0x7f0000000200)={&(0x7f0000000140)=@abs, 0x6e, &(0x7f00000001c0)=[{&(0x7f00000000c0)=""/50, 0x32}], 0x1}, 0x2000) 03:33:42 executing program 1: semctl$SETALL(0x0, 0x0, 0x12, &(0x7f0000000000)) 03:33:42 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x40030000000000) 03:33:42 executing program 6: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6, 0x0, 0x0, 0x7fffffff}]}) r0 = getpid() tkill(r0, 0x0) 03:33:42 executing program 1: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) epoll_create(0x0) r1 = epoll_create(0x4) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_REVISION_MATCH(0xffffffffffffffff, 0x0, 0x42, 0x0, 0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r2, &(0x7f0000000280)) close_range(r0, 0xffffffffffffffff, 0x0) 03:33:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x40030000000000) 03:33:43 executing program 1: unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x401, 0x1400}, {0x0, 0xffff}], 0x2, 0x0) unshare(0x20000) unshare(0x48040080) 03:33:43 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000000000)=0x8, 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(r0, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000002600)={'macvtap0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(0xffffffffffffffff, 0x29, 0x32, &(0x7f0000002640)={@loopback, r1}, 0x14) pwrite64(0xffffffffffffffff, 0x0, 0x0, 0xfff) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000500)=ANY=[@ANYBLOB="01000000010004001800000020c9ce0fd2a8a03fdc8e255809340400da75a2ddccd2f777f6c605132cd68b6faf7ef6ba888b68ab96fcb81629d4b187ac18adc7670e02229b473a66cbaf2f6e0f526cc12f103842774c92d8b3c052851e99b98b8709860bdb36310aabe3ed2204e0127d48f6947a343c6bd6d5e09cccb2d42de48e068e64bd545bb640ff7ac933a8d25fd7a3573014704031fe2f44e8c206fbe558cafe3a45f9cc1922f27686b77cabc5204def6922", @ANYRES32=0xffffffffffffffff, @ANYBLOB="a4e8907393afd314e0caf58836b5af2b6292d7e5a9a8e3d7accd9b07187c6ccb0f1263d458f7e50eb2a1cfd192166062df304206de605b95cf42aea47d90b0778a3ab0a41ec456d05617b9f2ebd534f4f062a309de3bfdeed992d69df8"]) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, 0xffffffffffffffff, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:43 executing program 0: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x18, 0x0, 0x101, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) clone3(0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[0x0, 0x0, r2], 0x3}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:43 executing program 7: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x14d882, 0x0) readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000080)=""/57, 0x39}], 0x1) 03:33:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x8000000000000, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x4000044) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:33:43 executing program 6: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x2000000, &(0x7f00000001c0)=ANY=[@ANYBLOB="0039724b0000e1f493ad6ada00c091502a9a7803e64ee8e0898a5fdd0fb89f0c4816a189214b4e574fc937afa302e6a39834512f8ea299dfbb75d7f8208c918eeeac8c957b53bfc4da9b5d9df12f3be696d3c117d6c2ae714a714885554ed7d257e286822d96965133bb0dbcd2d7942051b25f85642e18063e3ac73536879078c8358336d7bcde7891b0a29abd76d2d3ef2388c51332337c254202c44fdcef530783a0e7485a4480f15152c3ae1c53dca84119d6"]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffc, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$SO_ATTACH_FILTER(r0, 0x1, 0x1a, &(0x7f0000000080)={0x2, &(0x7f0000000300)=[{0x20, 0x0, 0x0, 0x80000}, {0x6}]}, 0x10) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) 03:33:43 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x18, 0x0, 0x101, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) clone3(0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[0x0, 0x0, r2], 0x3}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:43 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) getsockopt$IP6T_SO_GET_INFO(r0, 0x29, 0x49, 0x0, &(0x7f00000000c0)) 03:33:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x8000000000000, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x4000044) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:33:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x40030000000000) 03:33:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x8000000000000, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x4000044) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:33:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x8000000000000, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x4000044) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:33:43 executing program 4: r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000000)='ns/cgroup\x00') setns(r0, 0x0) 03:33:43 executing program 6: perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_bp={0x0, 0x8}, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:43 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x18, 0x0, 0x101, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) clone3(0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[0x0, 0x0, r2], 0x3}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x8000000000000, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x4000044) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:33:43 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="9fd6", 0x2, 0xfffffffffffffffb) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) dup(0xffffffffffffffff) 03:33:43 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x8000000000000, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x4000044) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:33:43 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, 0x0, 0x0) io_setup(0x3ff, &(0x7f0000000140)=0x0) io_destroy(r0) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) fcntl$dupfd(0xffffffffffffffff, 0x0, 0xffffffffffffffff) r1 = syz_open_dev$mouse(&(0x7f0000000540), 0x8000000000000, 0x0) sendmsg$AUDIT_TRIM(r1, &(0x7f00000001c0)={&(0x7f0000000000), 0xc, &(0x7f0000000180)={&(0x7f0000000100)={0x10, 0x3f6, 0x200, 0x70bd26, 0x25dfdbfc, "", ["", ""]}, 0x10}, 0x1, 0x0, 0x0, 0x40080}, 0x4000044) syz_open_dev$tty20(0xc, 0x4, 0x1) 03:33:43 executing program 0: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000040)={0x1c, 0x18, 0x0, 0x101, 0x0, 0x0, {0xa}, [@typed={0x8, 0x0, 0x0, 0x0, @ipv4=@multicast1}]}, 0x1c}}, 0x0) clone3(0x0, 0x0) r1 = getpid() process_vm_writev(r1, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) r2 = getpid() process_vm_writev(r2, &(0x7f00000016c0)=[{&(0x7f0000000080)=""/69, 0x45}, {0x0, 0x50000}, {0x0}], 0x3, &(0x7f0000002b80)=[{&(0x7f0000001780)=""/55, 0x7ffffffff000}], 0x1, 0x0) clone3(&(0x7f0000000340)={0x40001400, &(0x7f0000000040), &(0x7f0000000080), &(0x7f00000000c0), {0x2}, &(0x7f0000000240)=""/227, 0xe3, &(0x7f0000000100)=""/4, &(0x7f0000000140)=[0x0, 0x0, r2], 0x3}, 0x58) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:43 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCSETAF(r0, 0x5408, &(0x7f0000000000)={0x0, 0xfffd, 0x0, 0x8}) ioctl$TIOCSTI(r0, 0x5412, &(0x7f0000000080)) write(r0, &(0x7f0000000000)="58eca2371f240992157b2c5db411d43f24e9d0434502a379e34d6fa142664a0d9daa0a6672009eb4692a1e56594f1a6d08d2376e486826dee0c6308882fad9fa8fbd2131dcbe6863caab70d3efe7dbd6ddddda43e7e89a19ffad3969d898276100ea4a97fa1eb375ff41e4cd2fb645c48b396584b11cda591dad85392c586385d2f49a1bc96daf648085400a4385f93726ea3df00ecaaf7b3fe2def85a450cd75eca8563ca7be8786723ae6b865898d11f8e6f4754e5b77ede95cd6ebde79ae922ed077c9b4cd1702e572a963b6eaafc1bb07d80bc125629455623578d1f60233f5cf85a3ebd6ad9e5b318074868cdb69c9721b5082849aa2c53", 0xfa) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) open_by_handle_at(0xffffffffffffffff, 0x0, 0x0) 03:33:43 executing program 1: unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x401, 0x1400}, {0x0, 0xffff}], 0x2, 0x0) unshare(0x20000) unshare(0x48040080) 03:33:43 executing program 5: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_GET_RESERVED_SIZE(r0, 0x2284, &(0x7f0000000380)) 03:33:43 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 03:33:43 executing program 5: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x17, &(0x7f0000000040)=0x80000001, 0x4) 03:33:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 03:33:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="9fd6", 0x2, 0xfffffffffffffffb) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) dup(0xffffffffffffffff) 03:33:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$sock_int(r0, 0x1, 0x6, &(0x7f0000000000), 0x4) 03:33:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 03:33:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 03:33:44 executing program 1: unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x401, 0x1400}, {0x0, 0xffff}], 0x2, 0x0) unshare(0x20000) unshare(0x48040080) 03:33:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="9fd6", 0x2, 0xfffffffffffffffb) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) dup(0xffffffffffffffff) 03:33:44 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000080)={0x2, 0x0, @remote}, 0x10, 0x0, 0x0, &(0x7f0000000040)=[@ip_tos_u8={{0x18}}], 0x18}, 0x0) 03:33:44 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:33:44 executing program 6: pidfd_open(0x0, 0x2) 03:33:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 03:33:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 03:33:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) add_key(&(0x7f0000000040)='asymmetric\x00', 0x0, &(0x7f0000000180)="9fd6", 0x2, 0xfffffffffffffffb) ioctl$SG_SET_COMMAND_Q(0xffffffffffffffff, 0x2271, 0x0) dup(0xffffffffffffffff) 03:33:44 executing program 1: unshare(0x8000000) semget$private(0x0, 0x4000, 0x0) semtimedop(0x0, &(0x7f0000000040)=[{0x0, 0x401, 0x1400}, {0x0, 0xffff}], 0x2, 0x0) unshare(0x20000) unshare(0x48040080) 03:33:44 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:33:44 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) munlock(&(0x7f0000ffc000/0x4000)=nil, 0x4000) 03:33:44 executing program 6: iopl(0x3) syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) 03:33:44 executing program 6: r0 = socket$netlink(0x10, 0x3, 0x0) setsockopt$netlink_NETLINK_BROADCAST_ERROR(r0, 0x10e, 0x4, &(0x7f0000000040)=0x2, 0x4) 03:33:44 executing program 0: memfd_create(&(0x7f0000000040)='C\x8b\t\xbe\xa5$\xba\\\xf4b4D\x8d\xa6\xf5r\xe7\xadz\n;\xfc|,\x15\xb8a\xa5\n{\r.\xad\x01du\x04?\x87\x12L`4\xbc\x88T\xdfC\xa6gp\x06r\f\xdb\xedq\x99\xeb\xf7\n\x83\xccQ\v\xcd\xa4`m\xea\xa4\f\xb4b\xa0~?9\b\xe5\x17\xca\xdf\n\b\xc7R\x9d-g>\xa0:\x8c<\x9a24j\x9e&.\xef\x19O\x95Q\xd0l\xc3\xabDc\x8c\xc3\xbd`Q\xf4M\xdc\xdf\x83|6{-!%\xec\xaa\xc3\xed:\xbfR\xb0\xc2\xf7|m,\x8d\xa9/\xabp\xe0M\a\xe4\x1ak\xe0\x86w[\x05\t\xe31\x15\xd4\x8d(N\x15zk\x06\x93\x82\x9aS3\xfaE\xab>2\xa8l8\x17\nd\xa5\x12r2\x95w\x80\x95!(k\x8b\x92E\xfd\x9fHo\xd5\xfb\xfbP\xd2\xa0g(&\'\\\xc8b\xf3\xbd\x02\xacu\xbb\xf0\xd6\xbe\xaa\x86J\xferD\xa1P|\n\x02J\t.\xb0f\x1e\xc1\xf1\xea\x1f\xbb\xa2INAX_\xc46v\xc6', 0x0) 03:33:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:44 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000000300)={0x0, 0x0, &(0x7f00000002c0)={&(0x7f0000000240)={0x1c, 0x1, 0x4, 0x801, 0x0, 0x0, {}, [@NFULA_CFG_CMD={0x5, 0x1, 0x3}]}, 0x1c}}, 0x0) 03:33:44 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/164, 0xa4}], 0x1, 0x0, 0x0) r1 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) fcntl$setlease(r1, 0x400, 0x0) 03:33:44 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:33:44 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TCXONC(r0, 0x540a, 0x3) 03:33:44 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x7) lseek(r0, 0x0, 0x1) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) 03:33:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = memfd_create(&(0x7f0000000000)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb621p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xd6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfaj~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/549, 0x0) fsetxattr(r0, &(0x7f0000000600)=@known='security.selinux\x00', &(0x7f0000000640)='/!/@^\\#/@-\x00', 0xb, 0x0) [ 1811.834453] SELinux: Context /!/@^\#/@- is not valid (left unmapped). [ 1811.836743] audit: type=1400 audit(2000000024.665:115): avc: denied { associate } for pid=462747 comm="syz-executor.6" name=6D656D66643A42DB2F89036CDE62CBB534EDBE4C59B55AE11253F547CCF3E902680BCA2896E143DF1CEA8543FB1013FA0316CD17A280A17AB47295C3409DA6F192237D67D360F7CE7ACBB31ABBC438658EB126D18AE6217F8DEA2C7178A238BF22C765064CB036EB3C24D7BAE501039472ABD44A0373AFF641BF56FA1E778DBF994997D8D2E811C404 dev="tmpfs" ino=3226 scontext=system_u:object_r:unlabeled_t:s0 tcontext=system_u:object_r:tmpfs_t:s0 tclass=filesystem permissive=1 srawcon="/!/@^\#/@-" 03:33:44 executing program 5: r0 = socket$inet6_udp(0xa, 0x2, 0x0) fcntl$setflags(r0, 0x2, 0x0) 03:33:44 executing program 4: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000040)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000000)=0x7fffffff) 03:33:44 executing program 2: sched_rr_get_interval(0x0, &(0x7f0000000040)) mmap$IORING_OFF_CQ_RING(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x1, 0x10, 0xffffffffffffffff, 0x8000000) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000140)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x0, 0x0, @fd, 0x5, 0x0, 0x0, 0x15, 0x1}, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000004f00)=[{{0x0, 0x0, &(0x7f0000001900)=[{0x0}, {0x0}], 0x2}}, {{0x0, 0x0, &(0x7f00000023c0)=[{0x0}, {&(0x7f0000001e80)=""/110, 0x6e}, {0x0}, {0x0}], 0x4}}, {{0x0, 0x0, 0x0}}, {{&(0x7f0000002880)=@sco={0x1f, @none}, 0x80, &(0x7f00000029c0), 0x0, &(0x7f0000002a00)=""/188, 0xbc}}, {{0x0, 0x0, 0x0, 0x0, &(0x7f0000004e00)=""/208, 0xd0}}], 0x5, 0x120, &(0x7f0000005140)) openat$hwrng(0xffffffffffffff9c, &(0x7f0000005340), 0x0, 0x0) syz_genetlink_get_family_id$batadv(&(0x7f00000058c0), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, 0x0) 03:33:44 executing program 0: syz_emit_ethernet(0x19, &(0x7f0000000180)={@multicast, @multicast, @val={@val={0x8100}}, {@llc={0x8100, {@llc={0x0, 0x0, '\x00'}}}}}, 0x0) 03:33:44 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_SET_OUTPUT(r1, 0x2405, r2) 03:33:44 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xfffbffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000080)='/proc/sysvipc/shm\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000040)=[{&(0x7f0000000300)=""/200, 0xc8}], 0x1, 0x0, 0x0) 03:33:44 executing program 3: r0 = socket$inet6(0xa, 0x1, 0x0) fchown(r0, 0xffffffffffffffff, 0xffffffffffffffff) [ 1812.006656] EXT4-fs warning (device sda): ext4_block_to_path:105: block 2147483647 > max in inode 16091 [ 1812.009287] EXT4-fs warning (device sda): ext4_block_to_path:105: block 2147483647 > max in inode 16091 03:33:44 executing program 0: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [], 0x0, "3e3b3204ece552"}) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x31, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fspick(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x1) io_setup(0x1f, &(0x7f0000000640)=0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa040000fdffffff050000000000000007000000000000001f0000000000000001000000000000000000000000000000000000000000000000000000000000000700000000000000810000000000000000000080000000000400000000000000fffeffffffffffff000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a57c4d90441596810dd0813de7b1927d52037fa19da63c94445647f26b20c7d50c474c7393fba27670928558258a"]) io_submit(r0, 0x5, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000600)="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", 0x6c0}]) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000180)=0x1) 03:33:44 executing program 4: r0 = socket$nl_generic(0x10, 0x3, 0x10) setsockopt$sock_timeval(r0, 0x1, 0x15, &(0x7f0000000bc0), 0x10) 03:33:44 executing program 3: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000001480)={0x0, 0x0, &(0x7f0000001440)=[{&(0x7f00000010c0)={0x2c, 0x10, 0x1, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x2}, @typed={0x4, 0x0, 0x0, 0x0, @binary}, @nested={0xc, 0x4, 0x0, 0x1, [@typed={0x8, 0x0, 0x0, 0x0, @pid}]}]}, 0x2c}], 0x1}, 0x0) 03:33:44 executing program 5: prctl$PR_SCHED_CORE(0x27, 0x0, 0xffffffffffffffff, 0x0, 0x0) 03:33:44 executing program 4: r0 = syz_open_procfs(0x0, &(0x7f0000000040)='net/fib_trie\x00') pread64(r0, &(0x7f00000003c0)=""/244, 0xf4, 0x8001) 03:33:44 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000040)={0x300}) [ 1812.182135] netlink: 'syz-executor.3': attribute type 4 has an invalid length. 03:33:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_DYING(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000040)={0x14, 0x6, 0x1, 0x201}, 0x14}}, 0x0) 03:33:45 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty1(0xc, 0x4, 0x1) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_gstrings={0x7}}) ioctl$BTRFS_IOC_WAIT_SYNC(0xffffffffffffffff, 0x40089416, 0x0) 03:33:45 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="ae", 0x1, 0x881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:33:45 executing program 5: prctl$PR_MCE_KILL(0x21, 0x1, 0x3) 03:33:45 executing program 1: setxattr$security_evm(0x0, &(0x7f0000000240), &(0x7f0000000280)=@md5={0x1, "ed986d4b13a5cf9846101a6cb593e6d9"}, 0x11, 0x0) 03:33:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) 03:33:45 executing program 2: mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) mount$9p_unix(&(0x7f0000000080)='./file0\x00', &(0x7f00000000c0)='./file0\x00', 0x0, 0x31e7402, 0x0) mount$9p_unix(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x2283ce9, 0x0) truncate(&(0x7f0000000040)='./file0\x00', 0x0) 03:33:45 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) write$binfmt_script(0xffffffffffffffff, &(0x7f0000000040)={'#! ', './file1'}, 0xb) dup(0xffffffffffffffff) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TIOCGPTPEER(r0, 0x5437, 0x0) 03:33:45 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:33:45 executing program 0: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) dup(r0) r1 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000100), 0x1, 0x0) ftruncate(r1, 0x6) 03:33:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open_tree(r0, &(0x7f0000000f80)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() process_vm_writev(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, r1, 0x6, 0xffffffffffffffff, 0x10) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x0, 0x8, 0x80, 0x7, 0x0, 0x5, 0x22080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000d80)}, 0x1c840, 0x0, 0x1, 0x9, 0x0, 0x4, 0x3, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r3, 0x8) 03:33:45 executing program 1: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) bind(r0, &(0x7f0000003c00)=@l2tp, 0x80) 03:33:45 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) close(r0) 03:33:45 executing program 1: io_setup(0x178, &(0x7f0000002b40)=0x0) io_destroy(r0) 03:33:45 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x6}, [@ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 03:33:45 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@in={0xa, 0x4e23, @local}, 0x88, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x25, 0x300}}], 0x18}}], 0x1, 0x0) fcntl$setown(r0, 0x8, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r1, &(0x7f0000000080)="01", 0x292e9) 03:33:45 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) 03:33:45 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open_tree(r0, &(0x7f0000000f80)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() process_vm_writev(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, r1, 0x6, 0xffffffffffffffff, 0x10) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x0, 0x8, 0x80, 0x7, 0x0, 0x5, 0x22080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000d80)}, 0x1c840, 0x0, 0x1, 0x9, 0x0, 0x4, 0x3, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r3, 0x8) 03:33:46 executing program 5: r0 = socket(0x11, 0x3, 0x0) bind$packet(r0, &(0x7f0000000180)={0x11, 0x1}, 0x14) 03:33:46 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:33:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open_tree(r0, &(0x7f0000000f80)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() process_vm_writev(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, r1, 0x6, 0xffffffffffffffff, 0x10) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x0, 0x8, 0x80, 0x7, 0x0, 0x5, 0x22080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000d80)}, 0x1c840, 0x0, 0x1, 0x9, 0x0, 0x4, 0x3, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r3, 0x8) 03:33:46 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) 03:33:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open_tree(r0, &(0x7f0000000f80)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() process_vm_writev(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, r1, 0x6, 0xffffffffffffffff, 0x10) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x0, 0x8, 0x80, 0x7, 0x0, 0x5, 0x22080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000d80)}, 0x1c840, 0x0, 0x1, 0x9, 0x0, 0x4, 0x3, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r3, 0x8) 03:33:46 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="ae", 0x1, 0x881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:33:46 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@in={0xa, 0x4e23, @local}, 0x88, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x25, 0x300}}], 0x18}}], 0x1, 0x0) fcntl$setown(r0, 0x8, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r1, &(0x7f0000000080)="01", 0x292e9) 03:33:46 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) [ 1813.450940] loop1: detected capacity change from 0 to 40 03:33:46 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) 03:33:46 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='cubic\x00', 0x6) 03:33:46 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open_tree(r0, &(0x7f0000000f80)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() process_vm_writev(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, r1, 0x6, 0xffffffffffffffff, 0x10) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x0, 0x8, 0x80, 0x7, 0x0, 0x5, 0x22080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000d80)}, 0x1c840, 0x0, 0x1, 0x9, 0x0, 0x4, 0x3, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r3, 0x8) 03:33:46 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open_tree(r0, &(0x7f0000000f80)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() process_vm_writev(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, r1, 0x6, 0xffffffffffffffff, 0x10) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x0, 0x8, 0x80, 0x7, 0x0, 0x5, 0x22080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000d80)}, 0x1c840, 0x0, 0x1, 0x9, 0x0, 0x4, 0x3, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r3, 0x8) 03:33:46 executing program 6: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000000000)) [ 1813.859888] loop1: detected capacity change from 0 to 40 03:33:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) 03:33:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) kexec_load(0x0, 0x0, 0x0, 0x0) 03:33:47 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) 03:33:47 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = dup(r0) ioctl$VT_GETSTATE(r1, 0x541d, &(0x7f0000000140)) dup3(0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup(0xffffffffffffffff) ioctl$VT_GETSTATE(r2, 0x5603, &(0x7f0000000140)) 03:33:47 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') open_tree(r0, &(0x7f0000000f80)='./file1\x00', 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x2}, 0x3, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = getpid() process_vm_writev(r1, 0x0, 0x0, 0x0, 0x0, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) perf_event_open(0x0, r1, 0x6, 0xffffffffffffffff, 0x10) openat(r0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) r3 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001240), 0x200000, 0x0) perf_event_open(&(0x7f0000000dc0)={0x3, 0x80, 0x0, 0x8, 0x80, 0x7, 0x0, 0x5, 0x22080, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x2, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x9, 0x2, @perf_bp={&(0x7f0000000d80)}, 0x1c840, 0x0, 0x1, 0x9, 0x0, 0x4, 0x3, 0x0, 0x800, 0x0, 0x1}, 0xffffffffffffffff, 0x3, r3, 0x8) 03:33:47 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x6) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_XFRM_POLICY(r1, 0x29, 0x23, &(0x7f0000000200)={{{@in6=@empty, @in6=@dev, 0x0, 0x0, 0x0, 0x0, 0xa, 0x0, 0x0, 0x0, 0x0, 0xee01}}, {{@in=@local, 0x0, 0x3c}}}, 0xe8) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000100)={&(0x7f0000000180)={0x14, 0x15, 0x0, 0x101}, 0x14}}, 0x0) 03:33:47 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="ae", 0x1, 0x881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:33:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@in={0xa, 0x4e23, @local}, 0x88, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x25, 0x300}}], 0x18}}], 0x1, 0x0) fcntl$setown(r0, 0x8, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r1, &(0x7f0000000080)="01", 0x292e9) [ 1814.421634] loop1: detected capacity change from 0 to 40 03:33:47 executing program 6: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) r1 = dup2(r0, r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x2811, r1, 0x0) 03:33:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x9}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$tun(0xffffffffffffff9c, &(0x7f0000000240), 0x18d080, 0x0) 03:33:47 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) getsockopt$sock_int(r0, 0x1, 0xb, 0x0, &(0x7f0000000040)) 03:33:47 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x2c00, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_bp={&(0x7f0000000040), 0x4}, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffc}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000380)={0xffffffffffffffff, 0x8, 0x1, 0x400}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x2, 0x0, 0x0, 0x0, 0x0, 0x2, 0x32261, 0xc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x5}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r0, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@in={0xa, 0x4e23, @local}, 0x88, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x25, 0x300}}], 0x18}}], 0x1, 0x0) fcntl$setown(r0, 0x8, 0x0) getsockopt$netlink(0xffffffffffffffff, 0x10e, 0x4, 0x0, &(0x7f0000000000)) socket$nl_xfrm(0x10, 0x3, 0x6) fallocate(0xffffffffffffffff, 0x0, 0x0, 0x87ffffc) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000001800), 0xd}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) write(r1, &(0x7f0000000080)="01", 0x292e9) 03:33:47 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r2, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) 03:33:47 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) write$P9_RVERSION(r1, &(0x7f0000000000)={0x15, 0x65, 0xffff, 0x16f3ba40, 0x8, '9P2000.u'}, 0x15) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000280)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@access_client}]}}) 03:33:47 executing program 4: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xa, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6}]}) socket$netlink(0x10, 0x3, 0x0) poll(&(0x7f0000000000)=[{r0}], 0x1, 0x0) [ 1814.810699] audit: type=1326 audit(2000000027.639:116): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=464561 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f46db218b19 code=0x0 03:33:47 executing program 5: syz_mount_image$ext4(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) io_setup(0x40, &(0x7f0000000240)=0x0) r1 = eventfd2(0x0, 0x0) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000440)={0x0, 0x0, 0x0, 0x5, 0x0, r1, 0x0}]) io_cancel(r0, &(0x7f0000000440)={0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0}, 0x0) 03:33:47 executing program 6: setuid(0xee00) prctl$PR_SET_SECUREBITS(0x18, 0x0) 03:33:47 executing program 2: r0 = fsopen(&(0x7f0000000140)='devtmpfs\x00', 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) fsconfig$FSCONFIG_SET_FLAG(r0, 0x0, &(0x7f0000000000)='silent\x00', 0x0, 0x0) 03:33:47 executing program 1: r0 = socket$inet_tcp(0x2, 0x1, 0x0) shutdown(r0, 0x1) pselect6(0x40, &(0x7f0000000100), &(0x7f0000000140)={0x9}, 0x0, 0x0, 0x0) 03:33:47 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(0xffffffffffffffff, 0xc0189371, &(0x7f0000000000)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x11401}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x26e1, 0x0) syncfs(r1) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xc1, 0xf8, 0x4, 0x81, 0x0, 0x9, 0x500, 0x5, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x9f7e, 0x1, @perf_bp={&(0x7f0000000140), 0x5}, 0x4925, 0x0, 0xfffffffd, 0x12e7dbf3779e0e50, 0x2, 0x2, 0x9, 0x0, 0x5, 0x0, 0x5}, 0xffffffffffffffff, 0xb, 0xffffffffffffffff, 0x8) sendfile(r0, 0xffffffffffffffff, &(0x7f0000000100), 0x7) perf_event_open(&(0x7f0000000240)={0x0, 0x80, 0x40, 0x5, 0x6, 0x5, 0x0, 0x2, 0xd0810, 0x9, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x4, 0x100000001}, 0x2a48, 0x0, 0x7, 0x3, 0x5, 0x2, 0xa8, 0x0, 0x3}, 0xffffffffffffffff, 0x5, 0xffffffffffffffff, 0x2) 03:33:47 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x7b00000000000000, 0x4}, &(0x7f0000000040)) syz_open_dev$vcsu(0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:33:47 executing program 5: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'sit0\x00', &(0x7f0000000100)=@ethtool_dump={0x4a}}) 03:33:47 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) write$P9_RLCREATE(r0, &(0x7f0000000000)={0x18}, 0x18) write$P9_RSETATTR(r0, &(0x7f0000000040)={0x7}, 0x7) 03:33:48 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) sendto(r0, &(0x7f0000000040)="ae", 0x1, 0x881, 0x0, 0x0) recvmmsg(r1, &(0x7f0000002980)=[{{0x0, 0x0, 0x0}}], 0x1, 0x0, 0x0) 03:33:48 executing program 7: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IPT_SO_GET_INFO(r0, 0x0, 0x41, 0x0, &(0x7f0000001ec0)) 03:33:48 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x7b00000000000000, 0x4}, &(0x7f0000000040)) syz_open_dev$vcsu(0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:33:48 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NLBL_CIPSOV4_C_REMOVE(r0, &(0x7f0000000700)={0x0, 0x0, &(0x7f00000006c0)={0x0}}, 0x0) 03:33:48 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) r1 = fsmount(r0, 0x0, 0x0) symlinkat(&(0x7f0000000000)='.\x00', r1, &(0x7f00000001c0)='./file0\x00') r2 = openat(r1, &(0x7f0000000040)='./file0/../file0\x00', 0x0, 0x0) unlinkat(r2, &(0x7f0000000100)='./file0\x00', 0x0) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x81, 0x2, 0x0, 0x0, 0x0, 0x10, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f, 0x1, @perf_bp={&(0x7f0000000100), 0x8}, 0x402, 0x68a, 0x8001, 0x6, 0x3ff, 0x1, 0x400, 0x0, 0x6, 0x0, 0x800}, 0xffffffffffffffff, 0x10, r2, 0x1) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r4 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r4, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendmsg$inet(r3, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r5, @remote, @broadcast}}}], 0x20}, 0x0) sendmsg$inet(0xffffffffffffffff, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0x2}], 0x1}, 0x0) 03:33:48 executing program 0: ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) [ 1815.633715] audit: type=1326 audit(2000000028.462:117): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=464561 comm="syz-executor.4" exe="/syz-executor.4" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7f46db218b19 code=0x0 03:33:49 executing program 4: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='configfs\x00', 0x0, 0x0) r0 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) getdents(r0, &(0x7f00000012c0)=""/4093, 0x18) getdents64(r0, &(0x7f0000000140)=""/174, 0xae) 03:33:49 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="2037f1375c88"}, 0x14) getsockname$packet(r0, 0x0, &(0x7f0000000440)) 03:33:49 executing program 7: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=@isofs={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, &(0x7f00000001c0), 0x0) 03:33:49 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) symlink(&(0x7f0000000000)='./file0\x00', &(0x7f0000000080)='./file1\x00') readlink(&(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=""/26, 0x1a) 03:33:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x7b00000000000000, 0x4}, &(0x7f0000000040)) syz_open_dev$vcsu(0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:33:49 executing program 5: syz_emit_ethernet(0x6a, &(0x7f00000000c0)={@multicast, @empty, @void, {@ipv4={0x800, @udp={{0x5, 0x4, 0x0, 0x0, 0x5c, 0x0, 0x0, 0x0, 0x11, 0x0, @remote, @remote}, {0x0, 0x0, 0x48, 0x0, @wg=@cookie={0x3, 0x0, "b278be8cdc64853764ec45da4cd3674770ff23b0c3fea8a5", "0ef705817d24e39358ce6e30edf9a3462e2f4bd80e80163e747f397ef4d4fd2e"}}}}}}, 0x0) 03:33:49 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000040)='devtmpfs\x00', 0x0) fsconfig$FSCONFIG_SET_STRING(r0, 0x6, 0x0, 0x0, 0x0) [ 1816.378786] tmpfs: Unknown parameter 'M' 03:33:49 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x0) setsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, &(0x7f0000000240)=0x1, 0x4) 03:33:49 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000480)={0x0, 0x0, &(0x7f0000000440)={&(0x7f0000001800)={0x14, 0x10, 0x0, 0x0, 0x0, 0x0, {0x0, 0x0, 0x4}}, 0x14}}, 0x0) 03:33:49 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x10000) sendfile(r0, r1, &(0x7f0000000000)=0x8, 0x81) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x58410, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {}, 0x2b713bea2488111c, {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000500)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)={{0x0, 0x7, 0x100000000, 0x5d2, 0x1, 0x10001, 0x380000, 0xffdf, 0x1, 0x0, 0x8a, 0x5, 0x3, 0xfffffffffffffffe, 0x7ff}, 0x8, [0x0]}) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:49 executing program 6: pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_GETFSMAP(r0, 0xc0c0583b, &(0x7f0000000080)={0x0, 0x0, 0x4d, 0x0, '\x00', [{}, {0x800, 0x0, 0x80000000000}]}) 03:33:49 executing program 1: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000480), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_802154(r0, 0x8933, &(0x7f00000004c0)={'wpan0\x00', 0x0}) sendmsg$NL802154_CMD_NEW_INTERFACE(r1, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000500)={0x1c, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8, 0x3, r3}]}, 0x1c}}, 0x0) 03:33:49 executing program 0: setgid(0xffffffffffffffff) 03:33:49 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x4080}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x3) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1, 0x4d031, 0xffffffffffffffff, 0x0) mq_getsetattr(0xffffffffffffffff, &(0x7f0000000000)={0x0, 0x7b00000000000000, 0x4}, &(0x7f0000000040)) syz_open_dev$vcsu(0x0, 0x0, 0x0) execveat(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 03:33:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001180)=ANY=[@ANYBLOB="14000000520001"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000001680)=[{{0xfffffffffffffffe, 0x0, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/116, 0x74}, {&(0x7f0000000800)=""/243, 0xf3}], 0x9}, 0x297a2015}], 0x1, 0x0, 0x0) 03:33:49 executing program 7: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=@isofs={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, &(0x7f00000001c0), 0x0) 03:33:49 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x11}, [@ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 03:33:49 executing program 3: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) remap_file_pages(&(0x7f0000003000/0x3000)=nil, 0x3000, 0x0, 0x0, 0x0) 03:33:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x0, 0x80, 0xc4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xd29, &(0x7f0000000780)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1255c2, 0x0) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000000)="1c", 0xf}]) 03:33:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001180)=ANY=[@ANYBLOB="14000000520001"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000001680)=[{{0xfffffffffffffffe, 0x0, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/116, 0x74}, {&(0x7f0000000800)=""/243, 0xf3}], 0x9}, 0x297a2015}], 0x1, 0x0, 0x0) 03:33:49 executing program 6: prlimit64(0x0, 0x7, &(0x7f0000000080)={0x4, 0x6}, 0x0) r0 = fsopen(&(0x7f0000000180)='ramfs\x00', 0x0) dup(r0) 03:33:49 executing program 7: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=@isofs={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, &(0x7f00000001c0), 0x0) 03:33:49 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000180)={0x34, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x18, 0x11d, 0x0, 0x1, [{0x14, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0x1e}, @NL80211_TID_CONFIG_ATTR_RETRY_SHORT={0x5, 0x7, 0xfb}]}]}]}, 0x34}}, 0x0) 03:33:49 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001180)=ANY=[@ANYBLOB="14000000520001"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000001680)=[{{0xfffffffffffffffe, 0x0, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/116, 0x74}, {&(0x7f0000000800)=""/243, 0xf3}], 0x9}, 0x297a2015}], 0x1, 0x0, 0x0) 03:33:49 executing program 7: syz_mount_image$tmpfs(&(0x7f00000000c0), &(0x7f0000000000)='./file1\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f00000001c0)=ANY=[]) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mkdirat(r0, &(0x7f0000000340)='./file1\x00', 0x0) name_to_handle_at(r0, &(0x7f0000000140)='./file1\x00', &(0x7f0000000180)=@isofs={0x14, 0x1, {0x0, 0x0, 0x0, 0x0, 0x0, 0x1}}, &(0x7f00000001c0), 0x0) 03:33:49 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x10000) sendfile(r0, r1, &(0x7f0000000000)=0x8, 0x81) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x58410, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {}, 0x2b713bea2488111c, {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000500)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)={{0x0, 0x7, 0x100000000, 0x5d2, 0x1, 0x10001, 0x380000, 0xffdf, 0x1, 0x0, 0x8a, 0x5, 0x3, 0xfffffffffffffffe, 0x7ff}, 0x8, [0x0]}) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:49 executing program 3: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x10, &(0x7f0000000040)=0x80000001, 0x4) 03:33:49 executing program 6: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000001600)='/proc/asound/seq/clients\x00', 0x0, 0x0) close(r0) 03:33:49 executing program 2: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) time(0x0) 03:33:49 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x11}, [@ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 03:33:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmsg$unix(r2, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x98}, 0x0) 03:33:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_msfilter(r0, 0x0, 0x13, &(0x7f0000000040)={@multicast1, @dev, 0x0, 0x4}, 0x10) 03:33:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$NFT_BATCH(r0, &(0x7f0000000280)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001180)=ANY=[@ANYBLOB="14000000520001"], 0x28}}, 0x0) recvmmsg(r0, &(0x7f0000001680)=[{{0xfffffffffffffffe, 0x0, &(0x7f0000000900)=[{0x0}, {0x0}, {0x0}, {0x0}, {0x0}, {&(0x7f0000000240)=""/25, 0x19}, {&(0x7f0000000700)=""/97, 0x61}, {&(0x7f0000000780)=""/116, 0x74}, {&(0x7f0000000800)=""/243, 0xf3}], 0x9}, 0x297a2015}], 0x1, 0x0, 0x0) 03:33:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x1c, r1, 0x3ab, 0x0, 0x0, {{0x11}, {@void, @val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 03:33:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x10000) sendfile(r0, r1, &(0x7f0000000000)=0x8, 0x81) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x58410, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {}, 0x2b713bea2488111c, {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000500)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)={{0x0, 0x7, 0x100000000, 0x5d2, 0x1, 0x10001, 0x380000, 0xffdf, 0x1, 0x0, 0x8a, 0x5, 0x3, 0xfffffffffffffffe, 0x7ff}, 0x8, [0x0]}) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 03:33:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmsg$unix(r2, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x98}, 0x0) 03:33:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x1c, r1, 0x3ab, 0x0, 0x0, {{0x11}, {@void, @val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 03:33:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x11}, [@ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 03:33:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x1c, r1, 0x3ab, 0x0, 0x0, {{0x11}, {@void, @val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 03:33:50 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 03:33:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmsg$unix(r2, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x98}, 0x0) 03:33:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 0: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$ethtool(&(0x7f0000000280), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(r0, &(0x7f00000008c0)={0x0, 0x0, &(0x7f0000000500)={&(0x7f00000001c0)={0x2c, r1, 0x1, 0x0, 0x0, {0x11}, [@ETHTOOL_A_EEE_HEADER={0x18, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_DEV_NAME={0x14, 0x2, 'syz_tun\x00'}]}]}, 0x2c}}, 0x0) 03:33:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f00000003c0), 0x0, 0x0) r1 = socket$inet6(0xa, 0x0, 0x10000) sendfile(r0, r1, &(0x7f0000000000)=0x8, 0x81) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r2, 0xc0189375, &(0x7f00000000c0)={{0x1, 0x1, 0x18, r2}, './file1\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x58410, 0x0, 0x3, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) ioctl$sock_inet_SIOCDARP(0xffffffffffffffff, 0x8955, &(0x7f0000000000)={{0x2, 0x0, @multicast1}, {}, 0x2b713bea2488111c, {0x2, 0x0, @empty}}) r3 = socket$inet(0x2, 0xa, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r3, 0x81f8943c, &(0x7f0000000500)) ioctl$BTRFS_IOC_TREE_SEARCH_V2(r0, 0xc0709411, &(0x7f0000000140)={{0x0, 0x7, 0x100000000, 0x5d2, 0x1, 0x10001, 0x380000, 0xffdf, 0x1, 0x0, 0x8a, 0x5, 0x3, 0xfffffffffffffffe, 0x7ff}, 0x8, [0x0]}) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:50 executing program 7: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) recvmsg$unix(r2, &(0x7f0000001780)={0x0, 0x0, 0x0, 0x0, 0x0, 0x98}, 0x0) 03:33:50 executing program 3: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) utimes(&(0x7f0000001a00)='./file0\x00', &(0x7f0000001a40)) 03:33:50 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000000c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000440)={0x1c, r1, 0x3ab, 0x0, 0x0, {{0x11}, {@void, @val={0x8, 0x3, r3}, @void}}}, 0x1c}}, 0x0) 03:33:50 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:50 executing program 0: perf_event_open(&(0x7f0000000200)={0x5, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0xffffffff81000000, 0x8}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:33:50 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = epoll_create1(0x0) epoll_ctl$EPOLL_CTL_ADD(r1, 0x1, r0, &(0x7f0000000140)={0xe0000001}) 03:33:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/30, 0x1e}], 0x1, 0x10001, 0x0) 03:33:51 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0x79, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$sock_int(r0, 0x1, 0x33, &(0x7f0000000000), 0x4) 03:33:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x100000000000, 0x58282, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x2}, 0xa4, 0x0, 0xfa72, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) 03:33:51 executing program 3: madvise(&(0x7f0000ffb000/0x3000)=nil, 0x3000, 0x12) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:51 executing program 1: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000000)='debugfs\x00', 0x0, 0x0) mount$9p_virtio(0x0, &(0x7f00000001c0)='./file0\x00', 0x0, 0x80020, &(0x7f0000000080)={'trans=virtio,', {[], [{@uid_eq}]}}) 03:33:51 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext3\x00', &(0x7f00000001c0)='./file0\x00', 0x0, 0x0, 0x0, 0x10000, &(0x7f0000000500)) write$binfmt_script(0xffffffffffffffff, 0x0, 0x0) 03:33:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) dup(0xffffffffffffffff) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) 03:33:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/30, 0x1e}], 0x1, 0x10001, 0x0) [ 1818.341578] No source specified [ 1818.351373] No source specified 03:33:51 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcd, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_setup(0x46fa, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x2}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000040), &(0x7f00000002c0)) 03:33:51 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = inotify_init1(0x0) r1 = inotify_add_watch(r0, &(0x7f0000006440)='./file0\x00', 0x5400000a) inotify_rm_watch(r0, r1) 03:33:51 executing program 6: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r0, 0x6, 0x9, &(0x7f0000000000)=0x1, 0x4) 03:33:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000340)={&(0x7f00000001c0)=""/27, 0x1b}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x20a242, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_io_uring_setup(0x46fa, &(0x7f0000000200)={0x0, 0x7219, 0x2, 0x3, 0x6d}, &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000100)) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) 03:33:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) close(r0) 03:33:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/30, 0x1e}], 0x1, 0x10001, 0x0) 03:33:51 executing program 5: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0003}]}) r0 = shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0x4000) shmdt(r0) 03:33:51 executing program 3: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) r1 = open(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) renameat2(r1, &(0x7f0000000100)='./file0\x00', r0, &(0x7f0000000140)='./file0\x00', 0x0) 03:33:51 executing program 2: connect(0xffffffffffffffff, 0x0, 0x0) 03:33:51 executing program 1: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) connect$inet6(r0, &(0x7f0000000580)={0xa, 0x0, 0x0, @mcast1, 0x6}, 0x1c) syz_emit_ethernet(0x4e, &(0x7f0000000080)={@multicast, @local, @void, {@ipv6={0x86dd, @icmpv6={0x0, 0x6, '\x00', 0x18, 0x3a, 0x0, @local, @local, {[], @ndisc_na={0x88, 0x0, 0x0, 0x0, '\x00', @ipv4={'\x00', '\xff\xff', @remote}}}}}}}, 0x0) 03:33:51 executing program 0: r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/tty/drivers\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000580)=[{&(0x7f0000000100)=""/30, 0x1e}], 0x1, 0x10001, 0x0) 03:33:51 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_emit_ethernet(0x6a, &(0x7f0000000100)={@multicast, @empty, @void, {@ipv4={0x800, @igmp={{0x5, 0x4, 0x0, 0x0, 0x14, 0x0, 0x0, 0x0, 0x2f, 0x0, @empty, @multicast1}, {0x0, 0x0, 0x0, @remote}}}}}, 0x0) 03:33:51 executing program 3: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) mknod(&(0x7f0000008d80)='./file0\x00', 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000340)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000080)="8a76c21185ee", 0x0, 0x0, 0x0, 0x0, 0x0}) 03:33:51 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, 0x0, 0x0) 03:33:51 executing program 5: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f00000000000000010000000500000000ff00000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000e0f4655f000000000000000001000000000000000b0000000004000008000000d2c201001203", 0x66, 0x400}, {&(0x7f0000010100)="000000000000000000000000cf5621b2fc4343c4a394dcf8911d5966010040", 0x1f, 0x4e0}], 0x0, &(0x7f0000013e00)) 03:33:51 executing program 1: r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) ioctl$CDROMREADAUDIO(r0, 0x5323, 0x0) 03:33:51 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:51 executing program 6: msgctl$IPC_RMID(0x0, 0x0) r0 = msgget$private(0x0, 0x20) msgsnd(r0, &(0x7f0000000000)={0x6, "f529cf7858ba1cbfb3cbf77b1c07e430005dd2554ad5011addc37a392c1dd05997e45304bbde14a434ebcac7b0c36475f9bf85d61d75c14fae0fe900938499a0018a54809245bf80695ddc1a843162bbe89d8da71a0374f0483829c321f30ee4bd8ace2b22c1161cbee61b4e9ca81632c052d28e0dd8021e013069ce29f217dabd283cf30ee9afee8f6661d6cdd6badd22d54ddc00036635e2634b7517ba8d7fcdcc27772fe856e96140f6f50ff96effeb"}, 0xb9, 0x800) r1 = msgget(0x2, 0x430) msgsnd(r0, &(0x7f00000000c0)={0x0, "b74925c15e860a6b63a789ad015f88341a352825c7c97a72cfde1d27"}, 0x24, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000100)={0x3, "b6ac5c63fec48d5273facdebca2a983ca9c1df6c1a"}, 0x1d, 0x0) msgsnd(r0, &(0x7f0000000140)={0x2, "eedc9748cb6013f29ed2d16674860b8fdfdf9c2c3fdeba2e20f004117fa19d46333324c8cdc1ef8603214b83098f"}, 0x36, 0x800) msgsnd(r0, &(0x7f0000000180)={0x2, "815211790b870d109c51262e315f8dc0e372961883c8a4a1192bea8d26f24478fc9dfa52fbbb"}, 0x2e, 0x800) msgsnd(r0, &(0x7f00000001c0)={0x55e8d681a4be684, "29fdd3f76c28ee2a586e4a273cadb474ab8e2029f1345f77e42e1a963ed9dfd8eedeb14621bc05e7225de4e5a6d45088d20352f2dc1e07c5622a9b58fe7d79f7fc30990c9cb4a23f5266eaba4e591b126173c21b5394e6bb9604b9df94fa0962dbe28acbc9e0ed66ca665d8816ee1c2b0074aa80797acdb918661041843e164b8f5c9e65464a38c716429c57cf5fcddd55e8b8b9bfdcd35c3a77f1618fe6305301fa4ff30697d4fcc2463f185886b0006e626ffb6a6af5e446d4f9eabbe9b3"}, 0xc7, 0x0) r2 = msgget$private(0x0, 0x2) msgrcv(r2, &(0x7f00000002c0)={0x0, ""/50}, 0x3a, 0x1, 0x2000) msgsnd(r0, &(0x7f0000000300)={0x0, "a1e34cacc861edbdeca962e4bb4f8a10f8a3762d504b70d8e827a09b4481045927118cb8ff894e9c2cf6ec9e6faf1438d5f1e9450f50dbad5b97c5f33d7a595d547d58b9b06bbce8c5d681f1a12c4409b6db2f0255398407ec0de059d3fd70c67ad7778d2e66ed21843c7e5ed78b7ca8d361b2e30d34a1357e5b4a58d1"}, 0x85, 0x800) msgctl$IPC_STAT(r1, 0x2, &(0x7f00000003c0)=""/4096) r3 = msgget(0x2, 0x444) msgrcv(r0, &(0x7f00000013c0)={0x0, ""/147}, 0x9b, 0x91c1ce92541690ca, 0x1000) r4 = msgget(0x0, 0x4) msgsnd(r4, &(0x7f0000001480)={0x3, "d223bf10d95d663a431e683a0de8d60297787fab90a338f8ae483c27c40a"}, 0x26, 0x0) msgctl$IPC_RMID(r3, 0x0) msgsnd(r2, &(0x7f00000014c0)={0x3, "c2ed9d96ea5f053708e7d42bcc3f7b24860b70d87fd7b3f6432c4a83866ea5f4cc4e66a821f1117130a6abd58d3143277fbd70f37f145edea9d552922a4d9be0a9de81dc5f15387df9ae0b013a"}, 0x55, 0x800) msgrcv(r3, &(0x7f0000001540)={0x0, ""/106}, 0x72, 0x3, 0x2800) 03:33:51 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r0, r0, 0x0, 0x100000) 03:33:51 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000340)={&(0x7f00000001c0)=""/27, 0x1b}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x20a242, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_io_uring_setup(0x46fa, &(0x7f0000000200)={0x0, 0x7219, 0x2, 0x3, 0x6d}, &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000100)) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) 03:33:51 executing program 5: prctl$PR_SET_NAME(0xf, 0x0) pread64(0xffffffffffffffff, 0x0, 0x0, 0x0) creat(&(0x7f0000000380)='./file0\x00', 0xe0) prctl$PR_CAP_AMBIENT(0x2f, 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xffffffff, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, r0, 0x8) r1 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r2 = ioctl$LOOP_CTL_GET_FREE(r1, 0x4c82) prctl$PR_SET_NAME(0xf, &(0x7f00000003c0)='/dev/loop-control\x00') ioctl$LOOP_CTL_REMOVE(r1, 0x4c81, r2) open_tree(0xffffffffffffffff, &(0x7f0000000000)='./file0\x00', 0x1) r3 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_GET_FREE(r3, 0x4c82) ioctl$FS_IOC_ENABLE_VERITY(r3, 0x40806685, &(0x7f0000000200)={0x1, 0x1, 0x1000, 0x68, &(0x7f0000000180)="763c7210635d1af96bd126bac5bd68f1932d2ee73b7a30d37002bc1d12cbc963ea7ed0ddb5f003461f7c0f5d989b049e312db02bc5cb73286860e96541d45a989dc2825075473b2a6c2b705025bb9a289780c4ef7549e2ea42f74f696b6b09bfbc281dae0a7a30c4", 0x3b, 0x0, &(0x7f00000000c0)="97c7d3666e22b869adeaac11ff8784610a043fa51db776ceb991e8d59727f72447c48ed7d21c5d5bbea500fc6a099a5dda6f30e4cb53c7257a407b"}) ioctl$FS_IOC_ENABLE_VERITY(0xffffffffffffffff, 0x40806685, 0x0) 03:33:51 executing program 2: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 03:33:51 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x2f, 0x0}) 03:33:52 executing program 3: mmap$IORING_OFF_CQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x0, 0x100030, 0xffffffffffffffff, 0x8000000) 03:33:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0086a0bd0c8c82c9aaaa03d940d2ed81ed3cf66b647364c218d3a37c1f9c54bd06c3a032acfd6638aebc3c80805b4b8bd22e921a7c2ecf8affdafd9b848dd32134b9b93529c446ddf76f5387e103882a1c24c3beca8292ae4706303eafd1ca465c0ba92d6dd4e9171284"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000340)={&(0x7f00000001c0)=""/27, 0x1b}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x20a242, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_io_uring_setup(0x46fa, &(0x7f0000000200)={0x0, 0x7219, 0x2, 0x3, 0x6d}, &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000100)) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) 03:33:52 executing program 6: syz_mount_image$iso9660(&(0x7f00000001c0), &(0x7f0000000200)='./file1\x00', 0x0, 0x0, &(0x7f00000006c0), 0x0, &(0x7f00000009c0)=ANY=[]) 03:33:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}}, 0x1000) r2 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000100), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "93d77b659e12f4bb5e39dd95c59a749be030fd00"}, 0x15, 0x0) socket(0x8, 0x3, 0x1) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) shmctl$SHM_LOCK(r2, 0xb) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) 03:33:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) setitimer(0x2, &(0x7f0000000000)={{0x77359400}, {0x77359400}}, 0x0) 03:33:52 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) preadv(0xffffffffffffffff, &(0x7f0000003880)=[{&(0x7f0000000400)=""/233, 0xe9}, {&(0x7f0000000500)=""/94, 0x5e}, {&(0x7f0000000380)=""/4, 0x4}, {&(0x7f0000000580)=""/65, 0x41}, {&(0x7f0000000600)=""/79, 0x4f}, {&(0x7f00000007c0)=""/4096, 0x1000}, {&(0x7f00000017c0)=""/153, 0x99}, {&(0x7f0000001880)=""/4096, 0x1000}, {&(0x7f0000002880)=""/4096, 0x1000}], 0x9, 0x7, 0x0) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) pwritev(0xffffffffffffffff, &(0x7f0000003940)=[{&(0x7f0000000680)="869dccf6c10b7cade2631782ed50a28386becb7e95ea6f3f864f6066c839fbceaf399865953a580c36c30bfa5a7253f02c68a22dd65bc0202d024ee7e65fa29532258559bce134faab570c7d454a0cd4134aee5f28f79f274d75add801f03f4d9bbf66273e13d599c25b8279689f1dccd05844789722", 0x76}, {&(0x7f0000000740)="811ac1ce8b303a73d51153bebd92", 0xe}], 0x2, 0x5, 0x3) 03:33:52 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$INCFS_IOC_READ_FILE_SIGNATURE(r0, 0x8010671f, &(0x7f0000000340)={&(0x7f00000001c0)=""/27, 0x1b}) r1 = openat$sr(0xffffffffffffff9c, &(0x7f0000000280), 0x20a242, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r1) sendmsg$TIPC_NL_NODE_GET(r1, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) syz_io_uring_setup(0x46fa, &(0x7f0000000200)={0x0, 0x7219, 0x2, 0x3, 0x6d}, &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000fef000/0x1000)=nil, &(0x7f0000000040), &(0x7f0000000100)) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r2, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) [ 1819.583465] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 1819.584720] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1819.585719] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1819.586595] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 1819.587559] blk_print_req_error: 55 callbacks suppressed [ 1819.587577] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 30 prio class 2 [ 1819.610336] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.611119] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.612205] buffer_io_error: 58 callbacks suppressed [ 1819.612221] Buffer I/O error on dev sr0, logical block 0, async page read [ 1819.618880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.619675] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.620891] Buffer I/O error on dev sr0, logical block 1, async page read 03:33:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) [ 1819.631222] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.632166] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.633280] Buffer I/O error on dev sr0, logical block 2, async page read [ 1819.650116] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.651351] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.652609] Buffer I/O error on dev sr0, logical block 3, async page read [ 1819.658872] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.659675] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.660767] Buffer I/O error on dev sr0, logical block 4, async page read 03:33:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) [ 1819.665071] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.665981] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.667058] Buffer I/O error on dev sr0, logical block 5, async page read [ 1819.674319] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.675093] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.676157] Buffer I/O error on dev sr0, logical block 6, async page read 03:33:52 executing program 3: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x36, &(0x7f0000000000), 0x8) close_range(r0, 0xffffffffffffffff, 0x0) [ 1819.698249] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.699069] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.700459] Buffer I/O error on dev sr0, logical block 7, async page read [ 1819.702151] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.703105] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1819.704204] Buffer I/O error on dev sr0, logical block 0, async page read [ 1819.711896] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.712840] Buffer I/O error on dev sr0, logical block 1, async page read [ 1819.722013] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) [ 1819.726290] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.730321] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.732969] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.735588] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.738131] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.740120] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.749435] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.753332] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.757932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.765338] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.767048] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.771484] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.775378] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.792087] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.794014] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.825873] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.837083] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.843246] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.845196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.848213] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.852140] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.862145] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.865117] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.868688] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.872231] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.878372] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.880925] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.883043] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1819.885115] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:52 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0086a0bd0c8c82c9aaaa03d940d2ed81ed3cf66b647364c218d3a37c1f9c54bd06c3a032acfd6638aebc3c80805b4b8bd22e921a7c2ecf8affdafd9b848dd32134b9b93529c446ddf76f5387e103882a1c24c3beca8292ae4706303eafd1ca465c0ba92d6dd4e9171284"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}}, 0x1000) r2 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000100), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "93d77b659e12f4bb5e39dd95c59a749be030fd00"}, 0x15, 0x0) socket(0x8, 0x3, 0x1) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) shmctl$SHM_LOCK(r2, 0xb) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) 03:33:52 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 6: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x5, &(0x7f0000000040)='*-\x00', &(0x7f0000000100), 0x0) 03:33:52 executing program 3: r0 = epoll_create(0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)) r2 = perf_event_open(&(0x7f00000004c0)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_io_uring_complete(0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r2, &(0x7f0000000000)) ppoll(&(0x7f0000000040)=[{r0}], 0x1, &(0x7f0000000180), 0x0, 0x0) 03:33:52 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB=',wfdno=', @ANYRESHEX, @ANYBLOB="2c616e616d653d65787434002c6e6f657874656e642c686173682c7375626a5f747970653d2b2dce40282da75dc32e2b2c646f6e745f657501643d000000000000000000", @ANYRESDEC, @ANYBLOB=',\x00']) setxattr$security_evm(&(0x7f0000000300)='./file0\x00', &(0x7f0000000440), &(0x7f0000000280)=@ng={0x4, 0x13, "f565f01c81f1c47447b4acdf3de118867b"}, 0xa6, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) r0 = syz_io_uring_complete(0x0) r1 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_all\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x181042, 0x0) io_cancel(0x0, &(0x7f0000000240)={0x0, 0x0, 0x0, 0x2, 0x7, r1, &(0x7f0000000380)="f18be15ed720e7b468c658ea2ec7851f07d5ac7b729f9118d77a26761c7c2900f8ad9c2110ef63c81a604a51230085516981656a7c8d9ac75e139eafb2be73a22dab3cf5015bffc92c2e3120afb8398848a945197b07972c53601be7e4def4626a", 0x61, 0x18, 0x0, 0x3, r2}, &(0x7f0000000400)) renameat(r0, &(0x7f0000000040)='./file0\x00', r2, &(0x7f0000000400)='./file0\x00') fsconfig$FSCONFIG_SET_PATH_EMPTY(0xffffffffffffffff, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) setxattr$security_evm(&(0x7f0000000480)='./file1\x00', &(0x7f0000000540), &(0x7f0000000580)=@sha1={0x1, "47990c3654fff19b20be3bcf287ca8f788eed885"}, 0x15, 0x2) r3 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x2042, 0x0) fcntl$setlease(r3, 0x400, 0x3) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:52 executing program 4: mbind(&(0x7f0000ffe000/0x1000)=nil, 0x1000, 0x0, 0x0, 0x0, 0x9) [ 1820.196119] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 1820.197078] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1820.197792] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1820.198438] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 1820.202919] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.214909] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.221554] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.223176] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.227999] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.233960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCGPGRP(r0, 0x540f, 0x0) [ 1820.248874] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.250360] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.274447] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.284813] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.293207] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.299080] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.301064] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.305916] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.307293] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.308904] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.314023] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.319180] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.329114] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0086a0bd0c8c82c9aaaa03d940d2ed81ed3cf66b647364c218d3a37c1f9c54bd06c3a032acfd6638aebc3c80805b4b8bd22e921a7c2ecf8affdafd9b848dd32134b9b93529c446ddf76f5387e103882a1c24c3beca8292ae4706303eafd1ca465c0ba92d6dd4e9171284"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) [ 1820.335030] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.348853] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.352112] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.353183] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.354297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.355811] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.358773] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.360788] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.370283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.379374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.381373] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.382964] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.386929] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.388170] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.389253] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.392960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.394801] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.396796] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.399943] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.401883] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.403155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_IPV6_FLOWLABEL_MGR(r0, 0x29, 0x4c, 0x0, 0x0) 03:33:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}}, 0x1000) r2 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000100), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "93d77b659e12f4bb5e39dd95c59a749be030fd00"}, 0x15, 0x0) socket(0x8, 0x3, 0x1) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) shmctl$SHM_LOCK(r2, 0xb) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) 03:33:53 executing program 6: r0 = mq_open(&(0x7f00000056c0)='syz1\x00', 0x842, 0x0, 0x0) ftruncate(r0, 0xfffffffd) 03:33:53 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) process_vm_readv(0x0, &(0x7f00000000c0)=[{&(0x7f0000005580)=""/4078, 0xfee}, {&(0x7f0000006580)=""/136, 0x88}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240), 0xf7, 0x0) 03:33:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2284, 0x7ffffffff000) 03:33:53 executing program 5: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(r0, 0x8917, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @multicast1}}) r1 = socket$inet_icmp_raw(0x2, 0x3, 0x1) ioctl$sock_inet_SIOCGIFDSTADDR(r1, 0x8916, &(0x7f0000000000)={'lo\x00', {0x2, 0x0, @multicast1}}) 03:33:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000002300)=ANY=[@ANYBLOB='\x00'], 0x90) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mmap(&(0x7f0000003000/0x1000)=nil, 0x1000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x4000)=nil, 0x4000, 0x0, 0x401a013, r1, 0x0) 03:33:53 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b00000000010000280200000284", 0x62, 0x400}, {&(0x7f0000010400)="0200000003000000040000006a", 0xd, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000400)=ANY=[@ANYBLOB="0086a0bd0c8c82c9aaaa03d940d2ed81ed3cf66b647364c218d3a37c1f9c54bd06c3a032acfd6638aebc3c80805b4b8bd22e921a7c2ecf8affdafd9b848dd32134b9b93529c446ddf76f5387e103882a1c24c3beca8292ae4706303eafd1ca465c0ba92d6dd4e9171284"]) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000300), 0x787102, 0x0) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', &(0x7f00000001c0), 0x106884, &(0x7f0000000340)={'trans=fd,', {}, 0x2c, {'wfdno', 0x3d, r0}, 0x2c, {[{@aname={'aname', 0x3d, 'ext4\x00'}}, {@noextend}], [{@hash}, {@subj_type={'subj_type', 0x3d, '+-\xce@(-\xa7]\xc3.+'}}, {@dont_appraise}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), &(0x7f0000000280)=@v2={0x0, 0x0, 0x0, 0x0, 0x3c, "3eae0f69d6ffcd92a117a8666a161adb69449712781fa6939e6db0b8592c48d317655e02c00761c728beadeec251fa0049c0fe8f07fdcb756d4b530b"}, 0x45, 0x0) symlinkat(0x0, 0xffffffffffffffff, 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f00000004c0)='rfdno', &(0x7f0000000500)='./file1\x00', 0xffffffffffffff9c) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r1, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) perf_event_open(&(0x7f0000007340)={0x4, 0x80, 0x5e, 0x40, 0x5, 0x7, 0x0, 0x6, 0x800, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x81, 0x4, @perf_config_ext={0x6, 0xfffffffffffffe00}, 0x4, 0x0, 0x6f8cafd3, 0x1, 0x7, 0x6, 0x223, 0x0, 0x1, 0x0, 0xe2}, 0x0, 0x1, 0xffffffffffffffff, 0x1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) 03:33:53 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x18, &(0x7f0000000300)=0x6, 0x4) 03:33:53 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') fchown(r0, 0x0, 0x0) 03:33:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2284, 0x7ffffffff000) 03:33:53 executing program 3: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) close_range(r0, r1, 0x2) pipe(&(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$TUNSETIFF(r3, 0x400454ca, &(0x7f00000003c0)={'ipvlan1\x00'}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc3, 0x0, 0x0, 0xfe, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000100), 0x4}, 0x40210}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000180)={0x1, 0x80, 0x73, 0x45, 0x18, 0x54, 0x0, 0x1, 0x0, 0x5, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, @perf_config_ext={0x10000, 0x2}, 0x80, 0x8, 0x2, 0x7, 0x2, 0x200, 0x8000, 0x0, 0x1d7, 0x0, 0x100}, 0x0, 0xb, 0xffffffffffffffff, 0x8) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x4, 0x2, 0x39a}, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) r4 = socket$nl_generic(0x10, 0x3, 0x10) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r6 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r6, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_FRAME(r4, &(0x7f00000000c0)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000100)={0x3c, r5, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r7}, @void}}, [@NL80211_ATTR_FRAME={0x1f, 0x33, @action={@wo_ht={{}, {}, @device_b}, @ntf_ch_w}}]}, 0x3c}}, 0x0) ioctl$TUNSETIFF(0xffffffffffffffff, 0x400454ca, &(0x7f0000000440)={'syz_tun\x00'}) sendmsg$NL80211_CMD_START_P2P_DEVICE(r2, &(0x7f0000000340)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x10000000}, 0xc, &(0x7f0000000300)={&(0x7f0000000400)={0x28, r5, 0x10, 0x70bd27, 0x25dfdbfd, {{}, {@val={0x8, 0x3, r7}, @val={0xc, 0x99, {0x100, 0x65}}}}, ["", "", ""]}, 0x28}, 0x1, 0x0, 0x0, 0x40}, 0x51) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'rose0\x00'}) r8 = syz_io_uring_setup(0x1, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000140)) io_uring_enter(r8, 0x2bd, 0x0, 0x0, 0x0, 0x0) 03:33:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) [ 1820.668130] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 1820.668868] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1820.669419] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1820.669920] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 1820.671812] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.673284] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.675323] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.690042] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.691234] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.692119] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.694376] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.695366] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 6: syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x10, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) dup3(r1, r0, 0x0) r2 = dup(0xffffffffffffffff) write$bt_hci(r2, &(0x7f0000000100)=ANY=[@ANYBLOB="15"], 0x6) [ 1820.697359] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.698374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.700121] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.701156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.709020] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.714128] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.715876] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.720024] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.721158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) ioctl$ifreq_SIOCGIFINDEX_team(r0, 0x8933, 0x0) [ 1820.733471] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.740999] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.748345] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.751901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.767148] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2284, 0x7ffffffff000) [ 1820.772276] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') fchown(r0, 0x0, 0x0) [ 1820.775921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.783135] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.792065] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.793289] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.794168] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.796155] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.797487] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.798821] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.801374] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.808157] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.812126] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.813348] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.814913] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.816069] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.830146] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.831156] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.838888] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.848172] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.853866] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.855094] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.860196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.861895] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.866237] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.869991] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1820.877320] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) 03:33:53 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') fchown(r0, 0x0, 0x0) 03:33:53 executing program 4: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$BLKTRACETEARDOWN(r0, 0x2284, 0x7ffffffff000) 03:33:53 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r0, 0x0) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(r0) sendmsg$TIPC_NL_NODE_GET(r0, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f00000006c0)=ANY=[@ANYBLOB="88000000", @ANYRES16=0x0, @ANYBLOB="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"], 0x88}}, 0x1000) r2 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) setsockopt$inet6_udp_int(0xffffffffffffffff, 0x11, 0xa, &(0x7f0000000100), 0x4) sendmsg$inet6(0xffffffffffffffff, &(0x7f0000000680)={&(0x7f0000000000)={0xa, 0x4e23, 0x0, @mcast2}, 0x1c, 0x0}, 0x0) fsetxattr$security_ima(0xffffffffffffffff, &(0x7f0000000200), &(0x7f0000000240)=@sha1={0x1, "93d77b659e12f4bb5e39dd95c59a749be030fd00"}, 0x15, 0x0) socket(0x8, 0x3, 0x1) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) shmctl$SHM_LOCK(r2, 0xb) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x200, 0x0) 03:33:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001c00)={0x2c, r1, 0x17, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{0x0, 0x3}]}]}]}]}, 0x2c}}, 0x0) 03:33:53 executing program 3: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000740), 0xffffffffffffffff) sendmsg$NL802154_CMD_SET_CCA_ED_LEVEL(r0, &(0x7f0000000840)={0x0, 0x0, &(0x7f0000000800)={&(0x7f00000001c0)={0x28, r1, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc, 0x6, 0x1}, @NL802154_ATTR_WPAN_PHY={0x8}]}, 0x28}}, 0x0) 03:33:53 executing program 2: r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) ioctl$TIOCL_SELLOADLUT(r0, 0x541c, &(0x7f0000000a40)) 03:33:53 executing program 6: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_RTHDR(r0, 0x29, 0x39, &(0x7f0000000100)={0x0, 0x4, 0x4, 0x0, 0x0, [@initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @ipv4={'\x00', '\xff\xff', @initdev={0xac, 0x1e, 0x0, 0x0}}]}, 0x28) 03:33:53 executing program 7: r0 = syz_open_procfs(0x0, &(0x7f0000000000)='mounts\x00') fchown(r0, 0x0, 0x0) [ 1821.044929] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 1821.045678] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1821.046172] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1821.046677] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 1821.048011] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.048805] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.049519] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.051359] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.052201] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.054814] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001c00)={0x2c, r1, 0x17, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{0x0, 0x3}]}]}]}]}, 0x2c}}, 0x0) [ 1821.058310] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.060233] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.061749] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.063861] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.065765] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.068820] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.070152] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.071237] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.072426] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.080610] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.082901] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.085394] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) [ 1821.093085] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.096237] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.101880] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.104283] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.108266] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.119158] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) [ 1821.122304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.127130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.130304] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.131431] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.132460] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.133779] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.134709] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.135723] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.138196] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.148137] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.149208] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001c00)={0x2c, r1, 0x17, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{0x0, 0x3}]}]}]}]}, 0x2c}}, 0x0) [ 1821.156144] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.157108] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.158405] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.159661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.175960] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.181200] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:53 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) 03:33:53 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x221, 0x0, 0x0, {{@in=@multicast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) [ 1821.191130] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.197331] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:54 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(r0, &(0x7f00000000c0)={0x1, @write_link_policy={{0x80d, 0x4}}}, 0x8) [ 1821.208887] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.217176] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:54 executing program 3: r0 = epoll_create1(0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f00000000c0)) epoll_ctl$EPOLL_CTL_MOD(r0, 0x4, r1, &(0x7f0000000100)) [ 1821.224240] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.226777] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.229473] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.231661] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.235084] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.243580] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.245040] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.246447] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.248059] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.250912] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1821.254188] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:33:54 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x221, 0x0, 0x0, {{@in=@multicast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 03:33:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) 03:33:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) 03:33:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) 03:33:54 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x221, 0x0, 0x0, {{@in=@multicast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 03:33:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b100)={0xc9d1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "6610f0c718ddef"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000591c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "aae1faf4f5add8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c100)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r4}, {0x0, r8}], 0x0, "bdbc890afe43fb"}) 03:33:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) 03:33:54 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(r0, &(0x7f00000000c0)={0x1, @write_link_policy={{0x80d, 0x4}}}, 0x8) 03:33:54 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000001c00)={0x2c, r1, 0x17, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_2GHZ={0xc, 0x0, 0x0, 0x1, [@NL80211_TXRATE_HT={0x5, 0x2, [{0x0, 0x3}]}]}]}]}, 0x2c}}, 0x0) 03:33:54 executing program 0: mknod(&(0x7f0000008d80)='./file0\x00', 0x800, 0x0) syz_open_procfs(0x0, 0x0) link(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='./file1\x00') 03:33:54 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f0000000380)={0x0, 0x0, &(0x7f0000000340)={&(0x7f0000000000)=@updpolicy={0xb8, 0x19, 0x221, 0x0, 0x0, {{@in=@multicast2, @in6=@private1, 0x0, 0x0, 0x0, 0x0, 0x2, 0x11, 0x0, 0x0, 0x0, 0xee00}}}, 0xb8}}, 0x0) 03:33:54 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(r0, &(0x7f00000000c0)={0x1, @write_link_policy={{0x80d, 0x4}}}, 0x8) [ 1821.529871] No source specified 03:33:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) setsockopt$inet_int(r0, 0x0, 0xa, 0x0, 0x0) 03:33:54 executing program 4: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) bind$bt_hci(r0, &(0x7f0000000040)={0x1f, 0xffffffffffffffff, 0x4}, 0x6) write$bt_hci(r0, &(0x7f00000000c0)={0x1, @write_link_policy={{0x80d, 0x4}}}, 0x8) 03:33:54 executing program 1: creat(&(0x7f0000000040)='./file0\x00', 0x0) mount$tmpfs(0x0, &(0x7f0000000400)='./file0\x00', &(0x7f0000000440), 0x0, &(0x7f0000000800)={[{@mpol={'mpol', 0x3d, {'prefer', '=relative', @val={0x3a, [0x35, 0x2d]}}}}]}) 03:33:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = getpgid(0xffffffffffffffff) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x1}, 0x40, 0x5}, r0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pread64(0xffffffffffffffff, &(0x7f0000009780)=""/112, 0x70, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_TIMESTAMP(r2, 0x1, 0x3f, &(0x7f00000000c0)=0xfff, 0x4) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x2000001, 0x1010, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_IOC_ASKUMOUNT(r2, 0x80049370, &(0x7f0000000000)) ioctl$sock_SIOCETHTOOL(0xffffffffffffffff, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0x23}}) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x400000}, 0xc, &(0x7f0000000240)={&(0x7f0000000340)={0x80, 0x0, 0x4, 0x70bd2a, 0x25dfdbff, {}, [@NBD_ATTR_INDEX={0x8, 0x1, 0x0}, @NBD_ATTR_CLIENT_FLAGS={0xc, 0x6, 0x2}, @NBD_ATTR_SERVER_FLAGS={0xc, 0x5, 0x20}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0x47}, @NBD_ATTR_SOCKETS={0x1c, 0x7, 0x0, 0x1, [{0x8, 0x1, r1}, {0x8}, {0x8}]}, @NBD_ATTR_SOCKETS={0x4}, @NBD_ATTR_SOCKETS={0x14, 0x7, 0x0, 0x1, [{0x8}, {0x8}]}, @NBD_ATTR_SIZE_BYTES={0xc, 0x2, 0xffffffffffffffff}]}, 0x80}, 0x1, 0x0, 0x0, 0x4008044}, 0x4000004) memfd_secret(0x80000) r3 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file0\x00', 0x0, 0x0) syncfs(r3) sendmsg$NBD_CMD_STATUS(0xffffffffffffffff, &(0x7f0000000300)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x400}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4044084}, 0x40) 03:33:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b100)={0xc9d1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "6610f0c718ddef"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000591c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "aae1faf4f5add8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c100)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r4}, {0x0, r8}], 0x0, "bdbc890afe43fb"}) [ 1821.746328] tmpfs: Bad value for 'mpol' 03:33:54 executing program 0: r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_io_uring_setup(0x2e6f, &(0x7f0000000440)={0x0, 0xcd8e, 0x2, 0x0, 0x2c8}, &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000004c0), &(0x7f0000000500)) pidfd_getfd(0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) ioctl$sock_SIOCGIFBR(0xffffffffffffffff, 0x8940, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(r1, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000080), 0xc}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) ioctl$sock_inet_SIOCSIFFLAGS(r0, 0x8914, &(0x7f0000000000)={'lo\x00'}) ioctl$AUTOFS_DEV_IOCTL_FAIL(0xffffffffffffffff, 0xc0189377, &(0x7f0000000600)=ANY=[@ANYBLOB="010000000100000018e30000", @ANYRES16, @ANYBLOB="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"]) [ 1821.815728] lo: entered promiscuous mode [ 1821.816204] lo: entered allmulticast mode [ 1821.823160] No source specified [ 1821.836107] IPv6: ADDRCONF(NETDEV_CHANGE): lo: link becomes ready 03:33:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b100)={0xc9d1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "6610f0c718ddef"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000591c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "aae1faf4f5add8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c100)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r4}, {0x0, r8}], 0x0, "bdbc890afe43fb"}) 03:33:54 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x100000, 0x2a, &(0x7f0000000200)=[{&(0x7f0000010000)="200000000002000019000000800100000f000000000000000100000005000000000004000040000020000000d3f4655fd3f4655f0100ffff53ef010001000000d3f4655f000000000000000001000000000000000b0000000004000008000000d2c20100120300000000000000000000000000000000000073797a6b616c6c6572000000000000002f746d702f73797a2d696d61676567656e32373131373433303500"/192, 0xc0, 0x400}, {&(0x7f0000010100)="00000000000000000000000079d64a30b19941939d5c6a24092e8c9a010040000c00000000000000d3f4655f00"/64, 0x40, 0x4e0}, {&(0x7f0000010200)="00000000000000000000000000000000000000000000000000000000200020000100000000000000000000000000000000000000040000004400000000000000", 0x40, 0x540}, {&(0x7f0000010300)="0300000004000000000000000000000000000000010400"/32, 0x20, 0x640}, {&(0x7f0000010400)="02000000030000000400000018000f000300040000000000000000000f00c2b4", 0x20, 0x800}, {&(0x7f0000010500)="ff000000ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0100ffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffffff0000000000000000d3f4655fd3f4655fd3f4655f00"/4128, 0x1020, 0x1000}, {&(0x7f0000011600)="ed41000000080000d3f4655fd3f4655fd3f4655f00000000000004004000000000000800050000000af301000400000000000000000000000100000020000000", 0x40, 0x2400}, {&(0x7f0000011700)="200000004c7ddc8f4c7ddc8f00000000d3f4655f00"/32, 0x20, 0x2480}, {&(0x7f0000011800)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000040000000", 0x40, 0x2800}, {&(0x7f0000011900)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2880}, {&(0x7f0000011a00)="8081000000180000d3f4655fd3f4655fd3f4655f00000000000001004000000010000800000000000af301000400000000000000000000000300000050000000", 0x40, 0x2c00}, {&(0x7f0000011b00)="20000000000000000000000000000000d3f4655f00"/32, 0x20, 0x2c80}, {&(0x7f0000011c00)="c041000000380000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800000000000af301000400000000000000000000000700000030000000", 0x40, 0x4800}, {&(0x7f0000011d00)="20000000000000000000000000000000d3f4655f000000000000000000000000000002ea00"/64, 0x40, 0x4880}, {&(0x7f0000011e00)="ed4100003c000000d3f4655fd3f4655fd3f4655f0000000000000200000000000000001003000000020000000d0000001000050166696c65300000000e0000002800050766696c6531000000000000000000000000000000000000000000000000000000b65c7bf3000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04070000000000000000000000000000646174610000000000000000", 0xc0, 0x4c00}, {&(0x7f0000011f00)="ed8100001a040000d3f4655fd3f4655fd3f4655f00000000000001004000000000000800010000000af3010004000000000000000000000001000000600000000000000000000000000000000000000000000000000000000000000000000000000000005a0e0125000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5000}, {&(0x7f0000012000)="ffa1000026000000d3f4655fd3f4655fd3f4655f00000000000001000000000000000000010000002f746d702f73797a2d696d61676567656e3237313137343330352f66696c65302f66696c653000000000000000000000000000000000000000000000b8e8b49f000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xa0, 0x5400}, {&(0x7f0000012100)="ed8100000a000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c65727300000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000008b63b3ec000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea040700000000000000000000000000006461746106015403000000000600000000000000786174747231000006014c0300000000060000000000000078617474723200"/256, 0x100, 0x5800}, {&(0x7f0000012200)="0000000000000000000000000000000078617474723200007861747472310000ed81000028230000d3f4655fd3f4655fd3f4655f00000000000002004000000000000800010000000af30100040000000000000000000000050000007000000000000000000000000000000000000000000000000000000000000000000000000000000044cd9848000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000", 0xc0, 0x5be0}, {&(0x7f0000012300)="ed81000064000000d3f4655fd3f4655fd3f4655f000000000000010000000000000000100100000073797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c6c657273797a6b616c4794644c000000000000000000000000000000000000000000000000200000004c7ddc8f4c7ddc8f4c7ddc8fd3f4655f4c7ddc8f0000000000000000000002ea04073403000000002800000000000000646174610000000000000000", 0xc0, 0x6000}, {&(0x7f0000012400)='\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00lersyzkallersyzkallersyzkallersyzkallers', 0x40, 0x63c0}, {&(0x7f0000012500)="020000000c0001022e000000020000000c0002022e2e00000b00000014000a026c6f73742b666f756e6400000c0000001000050266696c65300000000f0000001000050166696c6531000000100000001000050166696c6532000000100000001000050166696c6533000000110000009407090166696c652e636f6c64000000", 0x80, 0x10000}, {&(0x7f0000012600)="0b0000000c0001022e000000020000000c0002022e2e000000000000e8070000", 0x20, 0x18000}, {&(0x7f0000012700)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x18800}, {&(0x7f0000012800)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19000}, {&(0x7f0000012900)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x19800}, {&(0x7f0000012a00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a000}, {&(0x7f0000012b00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1a800}, {&(0x7f0000012c00)='\x00\x00\x00\x00\x00\b\x00'/32, 0x20, 0x1b000}, {&(0x7f0000012d00)="111fc0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x20000}, {&(0x7f0000012e00)="0200"/32, 0x20, 0x20400}, {&(0x7f0000012f00)="0300"/32, 0x20, 0x20800}, {&(0x7f0000013000)="0400"/32, 0x20, 0x20c00}, {&(0x7f0000013100)="0500"/32, 0x20, 0x21000}, {&(0x7f0000013200)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x21400}, {&(0x7f0000013300)="2719c0d901000000803a0900803a090000000000060000000000000005000000", 0x20, 0x28000}, {&(0x7f0000013400)="0200"/32, 0x20, 0x28400}, {&(0x7f0000013500)="0300"/32, 0x20, 0x28800}, {&(0x7f0000013600)="0400"/32, 0x20, 0x28c00}, {&(0x7f0000013700)="0500"/32, 0x20, 0x29000}, {&(0x7f0000013800)="0000000000000000010000000000000000000000000000000000000000000000000000000000000008000000000000000000000000000000000000000000000000000200"/96, 0x60, 0x29400}, {&(0x7f0000013900)='syzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkallersyzkal\x00\x00\x00\x00\x00\x00', 0x420, 0x30000}], 0x0, &(0x7f0000013e00)) 03:33:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000700)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x2000000, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r2, 0x5, 0x0, 0x0, {{0x14}, {@val={0x8, 0x3, r1}, @void}}}, 0x1c}}, 0x0) [ 1821.912037] No source specified 03:33:54 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b100)={0xc9d1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "6610f0c718ddef"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000591c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "aae1faf4f5add8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c100)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r4}, {0x0, r8}], 0x0, "bdbc890afe43fb"}) 03:33:54 executing program 4: shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) unshare(0x8000000) 03:33:54 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r0) r1 = getpid() r2 = fork() kcmp(r1, r2, 0x3, 0xffffffffffffffff, 0xffffffffffffffff) process_vm_readv(r2, &(0x7f00000006c0)=[{&(0x7f0000000400)=""/237, 0xed}, {&(0x7f0000000500)=""/161, 0xa1}, {&(0x7f00000005c0)=""/253, 0xfd}], 0x3, &(0x7f0000000740)=[{&(0x7f0000000700)=""/22, 0x16}], 0x1, 0x0) 03:33:54 executing program 1: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f00000001c0)={0x1, &(0x7f0000000080)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) mknodat$loop(r0, &(0x7f0000000040)='./file0\x00', 0x0, 0x1) fchmodat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) [ 1822.060008] No source specified 03:33:54 executing program 4: keyctl$link(0xc, 0x0, 0xfffffffffffffffa) 03:33:54 executing program 0: setreuid(0xee00, 0xee00) setreuid(0x0, 0x0) 03:33:54 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b100)={0xc9d1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "6610f0c718ddef"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000591c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "aae1faf4f5add8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c100)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r4}, {0x0, r8}], 0x0, "bdbc890afe43fb"}) 03:33:54 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:54 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b100)={0xc9d1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "6610f0c718ddef"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000591c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "aae1faf4f5add8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c100)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r4}, {0x0, r8}], 0x0, "bdbc890afe43fb"}) [ 1822.202922] No source specified [ 1822.307094] No source specified 03:33:55 executing program 4: set_mempolicy(0x5, &(0x7f0000000000)=0x9, 0x3f) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:55 executing program 1: perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000040)='proc\x00', 0x0) fcntl$lock(r0, 0x7, &(0x7f0000000180)={0x2, 0x0, 0x0, 0x3f}) 03:33:55 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r1, 0xd000943d, &(0x7f000004b100)={0xc9d1, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x8, "6610f0c718ddef"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000591c0)={0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000057440)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}], 0x0, "aae1faf4f5add8"}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f000004f540)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {0x0, r6}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f000004c100)={0x8, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r2}, {r4}, {0x0, r8}], 0x0, "bdbc890afe43fb"}) 03:33:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 6: pkey_mprotect(&(0x7f0000000000/0x400000)=nil, 0x400000, 0x1, 0xffffffffffffffff) syz_io_uring_setup(0x46fa, &(0x7f0000000140), &(0x7f0000ff2000/0x2000)=nil, &(0x7f0000fef000/0x1000)=nil, 0x0, 0x0) 03:33:55 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r1, &(0x7f0000000200)='E', 0x140000) [ 1822.518827] No source specified 03:33:55 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) open(&(0x7f0000000240)='./file1\x00', 0x800, 0x2) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) mount$9p_fd(0x0, &(0x7f0000000080)='./file0\x00', 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0)}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = fsmount(r0, 0x1, 0x8) perf_event_open(&(0x7f0000000140)={0x2, 0x80, 0x1, 0x1, 0x7f, 0x4, 0x0, 0xc5f, 0x8000, 0x5, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x2, @perf_bp={&(0x7f0000000000), 0x7}, 0x811, 0x2, 0xfffffeff, 0x4cdf06b0a93ae507, 0x15, 0x5a, 0xfff, 0x0, 0x7b5, 0x0, 0x40}, 0xffffffffffffffff, 0xd, r2, 0x8) sendfile(r0, r0, 0x0, 0x100000) 03:33:55 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file1\x00') mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000140)='binfmt_misc\x00', 0x0, 0x0) pivot_root(&(0x7f0000000080)='./file1\x00', &(0x7f00000001c0)='./file1\x00') 03:33:55 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r1, &(0x7f0000000200)='E', 0x140000) 03:33:55 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000040), 0x4000, 0x0) dup(r0) dup(0xffffffffffffffff) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(0xffffffffffffffff, 0xc0189372, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1}, 0x1c) socket$packet(0x11, 0x3, 0x300) r1 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, 0x0) r2 = socket$inet_icmp_raw(0x2, 0x3, 0x1) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) sendmsg$inet(r2, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {r4, @remote, @broadcast}}}], 0x20}, 0xe00) sendmsg$ETHTOOL_MSG_STRSET_GET(0xffffffffffffffff, &(0x7f0000000240)={&(0x7f0000000100), 0xc, &(0x7f0000000200)={&(0x7f0000000180)=ANY=[@ANYBLOB='D\x00\x00 ', @ANYRES16=0x0, @ANYBLOB="02052abd7000fcdbdf25010000003000018014eb01006d6163766c616e3000000000000000000800", @ANYRES32=r4, @ANYBLOB="08000100", @ANYRES32=0x0, @ANYBLOB="0800030003000000"], 0x44}, 0x1, 0x0, 0x0, 0x4}, 0x20000001) ioctl$sock_SIOCGIFINDEX(0xffffffffffffffff, 0x8933, &(0x7f0000000000)={'syz_tun\x00'}) 03:33:55 executing program 4: set_mempolicy(0x5, &(0x7f0000000000)=0x9, 0x3f) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:55 executing program 6: r0 = epoll_create(0x5) r1 = eventfd2(0x3, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000000)) read$eventfd(r1, &(0x7f0000000040), 0x8) 03:33:55 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r1, &(0x7f0000000200)='E', 0x140000) 03:33:55 executing program 1: r0 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000007ec0)={0x0, 0x0, &(0x7f00000003c0)=[{&(0x7f0000007f00)={0x1c, 0x21, 0x1, 0x0, 0x0, "", [@generic="026b02db13cfb35673"]}, 0x1c}], 0x1}, 0x0) 03:33:55 executing program 4: set_mempolicy(0x5, &(0x7f0000000000)=0x9, 0x3f) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:55 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r1, &(0x7f0000000200)='E', 0x140000) 03:33:55 executing program 2: r0 = syz_mount_image$vfat(0x0, &(0x7f0000000340)='./file0\x00', 0xfffffffffffffffa, 0x0, 0x0, 0x3020c44, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x0}) lgetxattr(&(0x7f0000000080)='.\x00', &(0x7f0000000280)=@known='trusted.syz\x00', &(0x7f00000002c0), 0x0) link(&(0x7f00000002c0)='./file0\x00', &(0x7f0000000300)='./file0\x00') r2 = syz_open_dev$mouse(&(0x7f00000001c0), 0x1, 0x602000) accept(r2, 0x0, &(0x7f0000000200)) setresuid(0x0, r1, 0x0) keyctl$invalidate(0x15, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', &(0x7f0000000140), 0x1000) signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r3 = fork() r4 = fork() kcmp$KCMP_EPOLL_TFD(r4, r3, 0x7, 0xffffffffffffffff, &(0x7f00000000c0)={0xffffffffffffffff, r0, 0x8}) 03:33:55 executing program 5: r0 = io_uring_setup(0x0, 0x0) io_uring_register$IORING_REGISTER_BUFFERS(0xffffffffffffffff, 0x0, &(0x7f0000000200)=[{&(0x7f0000000000)=""/168, 0xa8}, {&(0x7f00000000c0)=""/227, 0xe3}, {&(0x7f0000000300)=""/4096, 0x1000}, {&(0x7f0000001300)=""/4096, 0x1000}, {&(0x7f0000002300)=""/4096, 0x1000}, {&(0x7f00000001c0)=""/57, 0x39}], 0x6) fcntl$dupfd(r0, 0x406, 0xffffffffffffffff) setsockopt$SO_TIMESTAMPING(0xffffffffffffffff, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000280)=0x2d8c, 0x4) setsockopt$SO_TIMESTAMPING(r1, 0x1, 0x25, &(0x7f0000000000)=0x90, 0x4) 03:33:55 executing program 0: r0 = syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) getsockopt$bt_BT_FLUSHABLE(r0, 0x112, 0x8, 0x0, &(0x7f0000000040)) 03:33:55 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) 03:33:56 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) ioctl$sock_inet_SIOCSIFADDR(r0, 0x8916, &(0x7f0000000000)={'team0\x00', {0x2, 0x0, @loopback}}) 03:33:56 executing program 0: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x0, 0x0, @empty}, 0x1c) getsockopt$IP6T_SO_GET_INFO(r1, 0x29, 0x10, 0x0, &(0x7f0000000040)) 03:33:56 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) getsockopt$sock_int(r0, 0x1, 0x1e, 0x0, &(0x7f0000006340)) 03:33:56 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r1, &(0x7f0000000200)='E', 0x140000) 03:33:56 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) 03:33:56 executing program 4: set_mempolicy(0x5, &(0x7f0000000000)=0x9, 0x3f) clone3(&(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:33:56 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r1, &(0x7f0000000200)='E', 0x140000) 03:33:56 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$ETHTOOL_MSG_EEE_SET(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x168, 0x0, 0x0, 0x0, 0x0, {}, [@ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_HEADER={0xc, 0x1, 0x0, 0x1, [@ETHTOOL_A_HEADER_FLAGS={0x8}]}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_TX_LPI_ENABLED={0x5}, @ETHTOOL_A_EEE_ENABLED={0x5}, @ETHTOOL_A_EEE_MODES_OURS={0x128, 0x2, 0x0, 0x1, [@ETHTOOL_A_BITSET_NOMASK={0x4}, @ETHTOOL_A_BITSET_BITS={0x40, 0x3, 0x0, 0x1, [{0x3c, 0x1, 0x0, 0x1, [@ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0xc, 0x2, 'nl80211\x00'}, @ETHTOOL_A_BITSET_BIT_INDEX={0x8}, @ETHTOOL_A_BITSET_BIT_NAME={0x6, 0x2, '&\x00'}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}, @ETHTOOL_A_BITSET_BIT_VALUE={0x4}]}]}, @ETHTOOL_A_BITSET_SIZE={0x8}, @ETHTOOL_A_BITSET_MASK={0xd5, 0x5, "76ca9442a7ff6e06dbe606e30bbbf53ed325dbc43f7379e49a75381496def553c6095ec26de9e77632baa249d8657631f22f64cd70d7ce6c72428d42f0ba6061e8166a0d7d2d6928c6a88d4fceab08b666b44ecb443d6d72430e5d189257b32c52b38a80121e31c9811262924c738c4ac84bae26e72e0b33bb0d8c57f716051509a6d55404d61a1c0f07cbae533bd3cdca16a3e2f49c2b13d9256ee5f1e51269029728a5395093a0baae6a06490b2e4fd9f2034f3ddfdbf2a7ee0584d198ba84c52b773054b6cedf5dbd17569718dec817"}]}]}, 0x168}}, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 03:33:56 executing program 0: r0 = socket$packet(0x11, 0x3, 0x300) ioctl$sock_SIOCGIFINDEX(r0, 0x8933, &(0x7f0000000000)={'syz_tun\x00', 0x0}) bind$packet(r0, &(0x7f00000000c0)={0x11, 0x0, r1, 0x1, 0x0, 0x6, @random="2037f1375c88"}, 0x14) syz_emit_ethernet(0x42, &(0x7f00000000c0)={@remote, @link_local, @void, {@arp={0x806, @ether_ipv6={0x1, 0x86dd, 0x6, 0x10, 0x0, @broadcast, @initdev={0xfe, 0x88, '\x00', 0x0, 0x0}, @dev, @empty}}}}, 0x0) 03:33:56 executing program 2: r0 = openat$tcp_congestion(0xffffffffffffff9c, &(0x7f0000000640), 0x1, 0x0) write(r0, &(0x7f0000000000)="1c95636039158078dc8a740a", 0xc) 03:33:56 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TCSETSW(r0, 0x5403, &(0x7f0000000280)={0x0, 0x0, 0xfdfdffff, 0x0, 0x0, "0d2cb730547af2b79aec56b084f3608a0f6662"}) 03:33:56 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) 03:33:56 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) getsockopt$inet_tcp_TCP_ZEROCOPY_RECEIVE(r0, 0x6, 0x23, 0x0, &(0x7f00000001c0)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x1c5042, 0x0) write(r1, &(0x7f0000000200)='E', 0x140000) 03:33:56 executing program 5: clone3(&(0x7f0000000000)={0x800100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hci(r1, 0x400448e1, &(0x7f0000000100)) 03:33:56 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) r1 = socket$inet6(0xa, 0x1, 0x0) dup(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 03:33:56 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) dup2(r0, r1) 03:33:56 executing program 4: r0 = socket$inet6_udplite(0xa, 0x2, 0x88) r1 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r1, 0x6, 0x13, &(0x7f00000001c0)=0x1, 0x4) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @empty}, 0x1c) setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, 0x0, 0x0) setsockopt$inet6_tcp_buf(r1, 0x6, 0x1f, &(0x7f0000000180)="8d", 0x1) connect$inet6(r1, &(0x7f0000000100)={0xa, 0x0, 0x0, @loopback}, 0x1c) close_range(r0, 0xffffffffffffffff, 0x0) 03:33:56 executing program 0: sendmsg$NL802154_CMD_NEW_INTERFACE(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000080)={0x20, 0x0, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_WPAN_DEV={0xc}]}, 0x20}}, 0x0) r0 = syz_open_dev$evdev(&(0x7f0000000040), 0x0, 0x0) ioctl$EVIOCGSW(r0, 0x80104592, &(0x7f0000000080)=""/205) 03:33:56 executing program 5: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000000c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_TEMPO(r0, 0x404c534a, &(0x7f0000000500)={0x0, 0x0, 0xfdfdffff}) 03:33:56 executing program 2: syz_genetlink_get_family_id$nl80211(&(0x7f0000000400), 0xffffffffffffffff) 03:33:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0xffffffff, &(0x7f00000003c0)=[{&(0x7f0000007f00)=ANY=[@ANYBLOB="1c00000020000100000000306b02db7302"], 0x1c}], 0x1}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000007800)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:33:56 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000240)='./cgroup.cpu/cpuset.cpus\x00', 0x4, 0x5, &(0x7f0000000540)=[{&(0x7f0000000280)="37eac79baa9b82808e50a70d8199b671d3f45b8e85b86fe9f1a0c2afdd001162fee149bdf49df1482e7fc92d0d2932a0043e122bbfdd5e5edf66baab03010dcf5e7e6d0b8d040449f7fc25a7ec92952bfd1fc916e772e503cd809b4fb23f51c2cd1ce0d068fa57e032803a72e8bc33c93be6aff59bdbf78ab8612ab1384ff31c21f4522051323133fe0a66cc34a080d2e2a264b43f9f1d3b3f9310fc6f4fd8c2d883a57bb231", 0xa6, 0x2}, {&(0x7f0000000340)="a7c614ce2a8413109d2b249279c9becc24be99005a14ed50bd9258c75230c609d2d43772260696239367333ddc082f7aaf73299751ac4e6bbda6b6f51af50beaaf58746167c8c467135b0a3d7fa1ed6d15cb629e0fafa3d5f5", 0x59, 0x1}, {&(0x7f00000003c0)="76fa20e79055915b72eaa1e98321642445271e1bacd21d721e164face8b40015217d2d51efb821703c50179fa2e8159d9639099a994dfb86032e3d24", 0x3c}, {&(0x7f0000000400)="3c311944d61ab0354c402497ecf9e21d1249fcbb64bd924dbe96d3a5a09b5478eb230949c8a2c99002de61b7ad3dcb33531ca07769fbe43e48261e2fcbca85b6db93b8644367cccefc96e6abbaa2d531c2c3a45d3310ddd1a3d3719aff9c236c293a6d1fd11a5796ecb8bbe5c81eb2ce6d4000ac43bce2db875c7a9d300eaf06d8f142156f16c7e3420796acf5f98d12432a8177c65bff674190923e5ded42749557b9ac15ca6c64695719eafbc2adc2145a3a7579ab06cc475c9f90d54cd93ca339aa427ff1454a1227a076557d15b01f4d2eb5a9b475ee", 0xd8, 0x7}, {&(0x7f0000000500)="eb74f26e04644313a65f8bdfa9b853168d968ef0286c231c17a7cc702a39f8aff1542c7a9b5788b3d4b49b499a95728133c204ccc4df", 0x36, 0x7}], 0x2883404, &(0x7f00000005c0)={[{@grpjquota}, {@noauto_da_alloc}, {@journal_dev={'journal_dev', 0x3d, 0x1}}], [{@seclabel}]}) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {r5, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) 03:33:56 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0xffffffff, &(0x7f00000003c0)=[{&(0x7f0000007f00)=ANY=[@ANYBLOB="1c00000020000100000000306b02db7302"], 0x1c}], 0x1}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000007800)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:33:56 executing program 4: r0 = openat$vcsu(0xffffffffffffff9c, &(0x7f0000001480), 0x0, 0x0) ioctl$sock_SIOCINQ(r0, 0x541b, 0x0) 03:33:56 executing program 2: r0 = openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x1c1042, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f000004f540)) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000500)) r2 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/vmallocinfo\x00', 0x0, 0x0) io_setup(0x0, &(0x7f0000000780)) openat(0xffffffffffffffff, &(0x7f00000000c0)='./file1\x00', 0x20800, 0x4f) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$sock_inet_SIOCSIFFLAGS(0xffffffffffffffff, 0x8914, &(0x7f0000000000)={'lo\x00'}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x400, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x80000000, 0x7f}, 0x1a60b, 0x0, 0x0, 0x9, 0x7}, 0x0, 0xffffffefffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r2, 0x0, 0x10000027f) 03:33:56 executing program 6: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) setxattr$security_evm(&(0x7f0000000000)='./cgroup.net/cgroup.procs/file0\x00', &(0x7f0000000240), &(0x7f0000000280)=@md5={0x1, "ed986d4b13a5cf9846101a6cb593e6d9"}, 0x11, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) [ 1824.162844] block device autoloading is deprecated and will be removed. 03:33:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0xffffffff, &(0x7f00000003c0)=[{&(0x7f0000007f00)=ANY=[@ANYBLOB="1c00000020000100000000306b02db7302"], 0x1c}], 0x1}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000007800)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:33:57 executing program 6: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) setxattr$security_evm(&(0x7f0000000000)='./cgroup.net/cgroup.procs/file0\x00', &(0x7f0000000240), &(0x7f0000000280)=@md5={0x1, "ed986d4b13a5cf9846101a6cb593e6d9"}, 0x11, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) 03:33:57 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:57 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000240)='./cgroup.cpu/cpuset.cpus\x00', 0x4, 0x5, &(0x7f0000000540)=[{&(0x7f0000000280)="37eac79baa9b82808e50a70d8199b671d3f45b8e85b86fe9f1a0c2afdd001162fee149bdf49df1482e7fc92d0d2932a0043e122bbfdd5e5edf66baab03010dcf5e7e6d0b8d040449f7fc25a7ec92952bfd1fc916e772e503cd809b4fb23f51c2cd1ce0d068fa57e032803a72e8bc33c93be6aff59bdbf78ab8612ab1384ff31c21f4522051323133fe0a66cc34a080d2e2a264b43f9f1d3b3f9310fc6f4fd8c2d883a57bb231", 0xa6, 0x2}, {&(0x7f0000000340)="a7c614ce2a8413109d2b249279c9becc24be99005a14ed50bd9258c75230c609d2d43772260696239367333ddc082f7aaf73299751ac4e6bbda6b6f51af50beaaf58746167c8c467135b0a3d7fa1ed6d15cb629e0fafa3d5f5", 0x59, 0x1}, {&(0x7f00000003c0)="76fa20e79055915b72eaa1e98321642445271e1bacd21d721e164face8b40015217d2d51efb821703c50179fa2e8159d9639099a994dfb86032e3d24", 0x3c}, {&(0x7f0000000400)="3c311944d61ab0354c402497ecf9e21d1249fcbb64bd924dbe96d3a5a09b5478eb230949c8a2c99002de61b7ad3dcb33531ca07769fbe43e48261e2fcbca85b6db93b8644367cccefc96e6abbaa2d531c2c3a45d3310ddd1a3d3719aff9c236c293a6d1fd11a5796ecb8bbe5c81eb2ce6d4000ac43bce2db875c7a9d300eaf06d8f142156f16c7e3420796acf5f98d12432a8177c65bff674190923e5ded42749557b9ac15ca6c64695719eafbc2adc2145a3a7579ab06cc475c9f90d54cd93ca339aa427ff1454a1227a076557d15b01f4d2eb5a9b475ee", 0xd8, 0x7}, {&(0x7f0000000500)="eb74f26e04644313a65f8bdfa9b853168d968ef0286c231c17a7cc702a39f8aff1542c7a9b5788b3d4b49b499a95728133c204ccc4df", 0x36, 0x7}], 0x2883404, &(0x7f00000005c0)={[{@grpjquota}, {@noauto_da_alloc}, {@journal_dev={'journal_dev', 0x3d, 0x1}}], [{@seclabel}]}) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {r5, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) 03:33:57 executing program 5: r0 = socket$inet6(0xa, 0x2, 0x0) connect$inet6(r0, &(0x7f0000000000)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @empty}}, 0x1c) r1 = socket$netlink(0x10, 0x3, 0x0) sendmsg$netlink(r1, &(0x7f0000007ec0)={0x0, 0xffffffff, &(0x7f00000003c0)=[{&(0x7f0000007f00)=ANY=[@ANYBLOB="1c00000020000100000000306b02db7302"], 0x1c}], 0x1}, 0x0) sendto$inet6(r0, 0x0, 0x0, 0x0, &(0x7f0000007800)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) 03:33:57 executing program 3: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000280)='./cgroup/pids.max\x00', 0x802, 0x4) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) ioctl$FS_IOC_GET_ENCRYPTION_PWSALT(r3, 0x40106614, &(0x7f00000002c0)) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) ioctl$AUTOFS_DEV_IOCTL_VERSION(r1, 0xc0189371, &(0x7f0000000000)=ANY=[@ANYBLOB="6cd7b689e1d81a2b00cab900", @ANYRES32=r2, @ANYBLOB='\x00\x00\x00\x00\x00\x00\x00\x00./cgroup/cgroup.procs\x00']) setsockopt$inet6_udp_int(r4, 0x11, 0x1, &(0x7f0000000240)=0x8, 0x4) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) r5 = openat$tun(0xffffffffffffff9c, &(0x7f00000001c0), 0x50000, 0x0) ioctl$FIOCLEX(r5, 0x5451) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r5, 0x400c6615, &(0x7f0000000040)={0x0, @adiantum, 0x0, @desc1}) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) 03:33:57 executing program 6: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) setxattr$security_evm(&(0x7f0000000000)='./cgroup.net/cgroup.procs/file0\x00', &(0x7f0000000240), &(0x7f0000000280)=@md5={0x1, "ed986d4b13a5cf9846101a6cb593e6d9"}, 0x11, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) 03:33:57 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x10001, 0x4) sendmmsg$inet6(r0, &(0x7f000000c380)=[{{&(0x7f0000000140)={0xa, 0x4e1f, 0x0, @mcast1}, 0x1c, 0x0, 0x0, &(0x7f000000b0c0)=ANY=[@ANYBLOB='$\x00\x00\x00\x00\x00\x00\x00)\x00\x00\x002\x00\x00\x00 '], 0x28}}], 0x1, 0x0) 03:33:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) openat(0xffffffffffffffff, &(0x7f0000000400)='./file1\x00', 0x111000, 0x64) 03:33:57 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:57 executing program 1: mmap(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x0, 0x44031, 0xffffffffffffffff, 0x0) get_mempolicy(0x0, 0x0, 0x0, &(0x7f0000001000/0x3000)=nil, 0x2) 03:33:57 executing program 3: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xb, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x3000)=nil, 0x3000, 0x0, 0x13, r0, 0x0) 03:33:57 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000240)='./cgroup.cpu/cpuset.cpus\x00', 0x4, 0x5, &(0x7f0000000540)=[{&(0x7f0000000280)="37eac79baa9b82808e50a70d8199b671d3f45b8e85b86fe9f1a0c2afdd001162fee149bdf49df1482e7fc92d0d2932a0043e122bbfdd5e5edf66baab03010dcf5e7e6d0b8d040449f7fc25a7ec92952bfd1fc916e772e503cd809b4fb23f51c2cd1ce0d068fa57e032803a72e8bc33c93be6aff59bdbf78ab8612ab1384ff31c21f4522051323133fe0a66cc34a080d2e2a264b43f9f1d3b3f9310fc6f4fd8c2d883a57bb231", 0xa6, 0x2}, {&(0x7f0000000340)="a7c614ce2a8413109d2b249279c9becc24be99005a14ed50bd9258c75230c609d2d43772260696239367333ddc082f7aaf73299751ac4e6bbda6b6f51af50beaaf58746167c8c467135b0a3d7fa1ed6d15cb629e0fafa3d5f5", 0x59, 0x1}, {&(0x7f00000003c0)="76fa20e79055915b72eaa1e98321642445271e1bacd21d721e164face8b40015217d2d51efb821703c50179fa2e8159d9639099a994dfb86032e3d24", 0x3c}, {&(0x7f0000000400)="3c311944d61ab0354c402497ecf9e21d1249fcbb64bd924dbe96d3a5a09b5478eb230949c8a2c99002de61b7ad3dcb33531ca07769fbe43e48261e2fcbca85b6db93b8644367cccefc96e6abbaa2d531c2c3a45d3310ddd1a3d3719aff9c236c293a6d1fd11a5796ecb8bbe5c81eb2ce6d4000ac43bce2db875c7a9d300eaf06d8f142156f16c7e3420796acf5f98d12432a8177c65bff674190923e5ded42749557b9ac15ca6c64695719eafbc2adc2145a3a7579ab06cc475c9f90d54cd93ca339aa427ff1454a1227a076557d15b01f4d2eb5a9b475ee", 0xd8, 0x7}, {&(0x7f0000000500)="eb74f26e04644313a65f8bdfa9b853168d968ef0286c231c17a7cc702a39f8aff1542c7a9b5788b3d4b49b499a95728133c204ccc4df", 0x36, 0x7}], 0x2883404, &(0x7f00000005c0)={[{@grpjquota}, {@noauto_da_alloc}, {@journal_dev={'journal_dev', 0x3d, 0x1}}], [{@seclabel}]}) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {r5, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./cgroup.net/devices.allow\x00', 0x1, 0x0) 03:33:57 executing program 1: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_IO(r0, 0x2285, &(0x7f0000000680)={0x53, 0x0, 0x6, 0x0, @scatter={0x0, 0x0, 0x0}, &(0x7f0000000580)="a30c00000000", 0x0, 0x0, 0x0, 0x0, 0x0}) 03:33:57 executing program 6: r0 = openat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.cpu/syz1\x00', 0x200002, 0x0) ioctl$BTRFS_IOC_GET_FEATURES(r0, 0x80189439, &(0x7f0000000040)) openat$cgroup_root(0xffffffffffffff9c, 0x0, 0x200002, 0x0) r1 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) fcntl$getflags(r1, 0xb) syz_io_uring_submit(0x0, 0x0, &(0x7f00000000c0)=@IORING_OP_READ=@use_registered_buffer={0x16, 0x1, 0x4000, @fd_index}, 0x9) syz_io_uring_setup(0xa45, &(0x7f0000000340)={0x0, 0x2cf5, 0x2, 0x2, 0xbf}, &(0x7f0000ffd000/0x2000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f00000003c0), &(0x7f0000000400)) 03:33:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) bind$unix(r0, &(0x7f0000000040)=@file={0x1, '.\x00'}, 0x2) [ 1824.501490] ata1.00: invalid command format 0 03:33:57 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:57 executing program 3: msgctl$IPC_RMID(0x0, 0x7) 03:33:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/164, 0xa4}], 0x1, 0x4, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, 0x0, 0x0) 03:33:57 executing program 2: r0 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r0, 0x890b, &(0x7f0000000080)={0x0, {0x2, 0x0, @broadcast}, {0x2, 0x0, @private=0xa010102}, {0x2, 0x0, @broadcast}, 0x72}) 03:33:57 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000240)='./cgroup.cpu/cpuset.cpus\x00', 0x4, 0x5, &(0x7f0000000540)=[{&(0x7f0000000280)="37eac79baa9b82808e50a70d8199b671d3f45b8e85b86fe9f1a0c2afdd001162fee149bdf49df1482e7fc92d0d2932a0043e122bbfdd5e5edf66baab03010dcf5e7e6d0b8d040449f7fc25a7ec92952bfd1fc916e772e503cd809b4fb23f51c2cd1ce0d068fa57e032803a72e8bc33c93be6aff59bdbf78ab8612ab1384ff31c21f4522051323133fe0a66cc34a080d2e2a264b43f9f1d3b3f9310fc6f4fd8c2d883a57bb231", 0xa6, 0x2}, {&(0x7f0000000340)="a7c614ce2a8413109d2b249279c9becc24be99005a14ed50bd9258c75230c609d2d43772260696239367333ddc082f7aaf73299751ac4e6bbda6b6f51af50beaaf58746167c8c467135b0a3d7fa1ed6d15cb629e0fafa3d5f5", 0x59, 0x1}, {&(0x7f00000003c0)="76fa20e79055915b72eaa1e98321642445271e1bacd21d721e164face8b40015217d2d51efb821703c50179fa2e8159d9639099a994dfb86032e3d24", 0x3c}, {&(0x7f0000000400)="3c311944d61ab0354c402497ecf9e21d1249fcbb64bd924dbe96d3a5a09b5478eb230949c8a2c99002de61b7ad3dcb33531ca07769fbe43e48261e2fcbca85b6db93b8644367cccefc96e6abbaa2d531c2c3a45d3310ddd1a3d3719aff9c236c293a6d1fd11a5796ecb8bbe5c81eb2ce6d4000ac43bce2db875c7a9d300eaf06d8f142156f16c7e3420796acf5f98d12432a8177c65bff674190923e5ded42749557b9ac15ca6c64695719eafbc2adc2145a3a7579ab06cc475c9f90d54cd93ca339aa427ff1454a1227a076557d15b01f4d2eb5a9b475ee", 0xd8, 0x7}, {&(0x7f0000000500)="eb74f26e04644313a65f8bdfa9b853168d968ef0286c231c17a7cc702a39f8aff1542c7a9b5788b3d4b49b499a95728133c204ccc4df", 0x36, 0x7}], 0x2883404, &(0x7f00000005c0)={[{@grpjquota}, {@noauto_da_alloc}, {@journal_dev={'journal_dev', 0x3d, 0x1}}], [{@seclabel}]}) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {r5, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup.net/cgroup.procs\x00', 0x2, 0x0) 03:33:57 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 03:33:57 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) mount$9p_fd(0x0, &(0x7f0000000340)='./file0\x00', &(0x7f0000000080), 0x0, &(0x7f0000000380)={'trans=fd,', {'rfdno', 0x3d, r0}, 0x2c, {'wfdno', 0x3d, r1}, 0x2c, {[{@noextend}, {@access_client}, {@cache_mmap}, {@cache_fscache}]}}) 03:33:57 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) 03:33:57 executing program 6: add_key$fscrypt_v1(0x0, 0x0, &(0x7f0000000380)={0x0, "4594587054c929f98bd655543a53dd47cfaf31cd21bb4ea0d5b7a7889450b92d3d18b605cf723f209da8663910d7baa49842b7ac5c04c10deda505abe65f012d"}, 0x48, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r0, 0xc0c0583b, &(0x7f0000000340)) 03:33:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/164, 0xa4}], 0x1, 0x4, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, 0x0, 0x0) 03:33:57 executing program 5: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, 0x0) epoll_create(0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1f, &(0x7f0000000640)=0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$FS_IOC_GETFSMAP(0xffffffffffffffff, 0xc0c0583b, &(0x7f0000000cc0)=ANY=[@ANYBLOB="00000000000000000900000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000fa040000fdffffff050000000000000007000000000000001f0000000000000001000000000000000000000000000000000000000000000000000000000000000700000000000000810000000000000000000080000000000400000000000000fffeffffffffffff000000000000000000000000000000000000000000000000400000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000a57c4d90441596810dd0813de7b1927d52037fa19da63c94445647f26b20c7d50c47"]) io_submit(r0, 0x1, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000600)="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", 0x5e8}]) openat$tun(0xffffffffffffff9c, &(0x7f0000000140), 0x40, 0x0) 03:33:57 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) r5 = syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000240)='./cgroup.cpu/cpuset.cpus\x00', 0x4, 0x5, &(0x7f0000000540)=[{&(0x7f0000000280)="37eac79baa9b82808e50a70d8199b671d3f45b8e85b86fe9f1a0c2afdd001162fee149bdf49df1482e7fc92d0d2932a0043e122bbfdd5e5edf66baab03010dcf5e7e6d0b8d040449f7fc25a7ec92952bfd1fc916e772e503cd809b4fb23f51c2cd1ce0d068fa57e032803a72e8bc33c93be6aff59bdbf78ab8612ab1384ff31c21f4522051323133fe0a66cc34a080d2e2a264b43f9f1d3b3f9310fc6f4fd8c2d883a57bb231", 0xa6, 0x2}, {&(0x7f0000000340)="a7c614ce2a8413109d2b249279c9becc24be99005a14ed50bd9258c75230c609d2d43772260696239367333ddc082f7aaf73299751ac4e6bbda6b6f51af50beaaf58746167c8c467135b0a3d7fa1ed6d15cb629e0fafa3d5f5", 0x59, 0x1}, {&(0x7f00000003c0)="76fa20e79055915b72eaa1e98321642445271e1bacd21d721e164face8b40015217d2d51efb821703c50179fa2e8159d9639099a994dfb86032e3d24", 0x3c}, {&(0x7f0000000400)="3c311944d61ab0354c402497ecf9e21d1249fcbb64bd924dbe96d3a5a09b5478eb230949c8a2c99002de61b7ad3dcb33531ca07769fbe43e48261e2fcbca85b6db93b8644367cccefc96e6abbaa2d531c2c3a45d3310ddd1a3d3719aff9c236c293a6d1fd11a5796ecb8bbe5c81eb2ce6d4000ac43bce2db875c7a9d300eaf06d8f142156f16c7e3420796acf5f98d12432a8177c65bff674190923e5ded42749557b9ac15ca6c64695719eafbc2adc2145a3a7579ab06cc475c9f90d54cd93ca339aa427ff1454a1227a076557d15b01f4d2eb5a9b475ee", 0xd8, 0x7}, {&(0x7f0000000500)="eb74f26e04644313a65f8bdfa9b853168d968ef0286c231c17a7cc702a39f8aff1542c7a9b5788b3d4b49b499a95728133c204ccc4df", 0x36, 0x7}], 0x2883404, &(0x7f00000005c0)={[{@grpjquota}, {@noauto_da_alloc}, {@journal_dev={'journal_dev', 0x3d, 0x1}}], [{@seclabel}]}) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {r5, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:57 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp, 0x0, 0x0, 0x0, 0x7}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_open_dev$tty20(0xc, 0x4, 0x1) mlock2(&(0x7f0000fef000/0x1000)=nil, 0x1000, 0x0) shmat(0xffffffffffffffff, &(0x7f0000ff2000/0x3000)=nil, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mmap$perf(&(0x7f0000fed000/0x3000)=nil, 0x3000, 0x0, 0x10, 0xffffffffffffffff, 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0x0, 0x2000000000000000}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x41, 0x0) r1 = ioctl$LOOP_CTL_GET_FREE(r0, 0x4c82) ioctl$BTRFS_IOC_DEFAULT_SUBVOL(r0, 0x40089413, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, r1) r2 = fsopen(&(0x7f0000000080)='devpts\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r2, 0x6, 0x0, 0x0, 0x0) r3 = fsmount(r2, 0x0, 0x0) mkdirat(r3, &(0x7f0000000040)='./file0\x00', 0x0) r4 = ioctl$LOOP_CTL_GET_FREE(0xffffffffffffffff, 0x4c82) ioctl$LOOP_CTL_REMOVE(r3, 0x4c81, r4) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000040)) mremap(&(0x7f0000fed000/0x1000)=nil, 0x1000, 0x1000, 0x7, &(0x7f0000ffd000/0x1000)=nil) fallocate(0xffffffffffffffff, 0x32, 0x8, 0x4) 03:33:57 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) 03:33:57 executing program 3: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_DELETE(r0, &(0x7f0000000080)={0x0, 0x0, &(0x7f0000000000)={&(0x7f00000000c0)={0x1c, 0x2, 0x1, 0x201, 0x0, 0x0, {0x2, 0x2}, [@CTA_MARK={0x8}]}, 0x1c}}, 0x0) 03:33:57 executing program 2: r0 = socket$packet(0x11, 0x2, 0x300) close_range(r0, 0xffffffffffffffff, 0x2) fsopen(&(0x7f0000000040)='selinuxfs\x00', 0x0) prctl$PR_SET_MM_EXE_FILE(0x23, 0xd, r0) 03:33:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/164, 0xa4}], 0x1, 0x4, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, 0x0, 0x0) 03:33:57 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) syz_io_uring_setup(0x0, &(0x7f0000000000)={0x0, 0x0, 0x0, 0x0, 0x8000039a}, &(0x7f0000ffb000/0x1000)=nil, &(0x7f0000ff9000/0x3000)=nil, 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000000)={'xfrm0\x00'}) ioctl$TUNATTACHFILTER(r0, 0x401054d5, &(0x7f0000000140)={0x0, 0x0}) 03:33:57 executing program 6: perf_event_open(&(0x7f0000001540)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) io_setup(0xd29, &(0x7f0000000780)) 03:33:57 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:57 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 03:33:57 executing program 3: r0 = socket$inet6_udp(0xa, 0x2, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000000500)=[{{0x0, 0x0, &(0x7f00000004c0)=[{&(0x7f00000002c0)="84", 0x1}], 0x1}}], 0x1, 0x24048894) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) [ 1825.081949] block device autoloading is deprecated and will be removed. 03:33:57 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFSLABEL(r0, 0x8008662c, &(0x7f0000000480)="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") 03:33:57 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_MD5SIG(r0, 0x6, 0xe, &(0x7f00000000c0)={@in6={{0xa, 0x0, 0x0, @private2}}, 0x0, 0x0, 0x68, 0x0, "704f5992d666aa2888e479ca552ee155f638582a91ca97213cf4774a2e4c350cdc3f9f62a4c21970bd149a52fa311b916bf00b51b808c412ed6b9fcbb5be4a2fb7dd8fd0dfa22b4100"}, 0xd8) 03:33:57 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) 03:33:57 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000000)='/proc/locks\x00', 0x0, 0x0) preadv(r0, &(0x7f0000000440)=[{&(0x7f0000000080)=""/164, 0xa4}], 0x1, 0x4, 0x0) sendmsg$NL80211_CMD_SET_CQM(0xffffffffffffffff, 0x0, 0x0) 03:33:58 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:58 executing program 3: waitid(0x2, 0x0, 0x0, 0x8, 0x0) 03:33:58 executing program 6: perf_event_open(&(0x7f0000000080)={0x5, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x4}, 0x44da0}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xa) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$sock_inet_SIOCADDRT(r1, 0x890b, &(0x7f0000000480)={0x0, {0x2, 0x4e20, @local}, {0x2, 0x4e25, @remote}, {0x2, 0x0, @broadcast}, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x100000001, 0xb50c}) ioctl$FICLONE(0xffffffffffffffff, 0x40049409, r1) socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) getsockopt$sock_buf(r1, 0x1, 0x37, &(0x7f0000000300)=""/78, &(0x7f0000000180)=0x4e) r3 = socket$inet_tcp(0x2, 0x1, 0x0) ioctl$FS_IOC_FSSETXATTR(r3, 0x401c5820, &(0x7f0000000040)={0x8, 0x7, 0x7, 0xfffffe00, 0x5}) r4 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000140)='cpuacct.usage_percpu_user\x00', 0x0, 0x0) mmap$perf(&(0x7f0000ffd000/0x3000)=nil, 0x3000, 0x0, 0x4000010, r4, 0x20) sendmsg$NL80211_CMD_GET_MPP(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f00000001c0)={0x10, 0x0, 0x0, 0x2}, 0xc, &(0x7f0000000240)={&(0x7f0000000bc0)=ANY=[@ANYRESDEC=r0, @ANYRES16=r2, @ANYBLOB="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"], 0x8c}, 0x1, 0x0, 0x0, 0x48000}, 0x880) openat(0xffffffffffffffff, &(0x7f0000000100)='./file0\x00', 0x4002, 0x0) r5 = openat$full(0xffffffffffffff9c, &(0x7f0000000000), 0x513b00, 0x0) sendmsg$NL80211_CMD_SET_BEACON(r5, &(0x7f0000000540)={&(0x7f0000000380)={0x10, 0x0, 0x0, 0x40000000}, 0xc, &(0x7f0000000500)={&(0x7f0000000580)=ANY=[@ANYBLOB='\x00\x00\x00\x00', @ANYRES32=r5, @ANYBLOB="00012cbc7000fcdbdf250e40000008000300", @ANYRES32=0x0, @ANYBLOB="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"], 0x404}, 0x1, 0x0, 0x0, 0x4c040}, 0x0) connect$inet6(0xffffffffffffffff, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) r6 = socket$inet6_udp(0xa, 0x2, 0x0) sendmmsg$sock(r6, &(0x7f0000001f40)=[{{&(0x7f0000000080)=@in={0xa, 0x4e23, @local}, 0x88, 0x0, 0x0, &(0x7f0000000440)=[@mark={{0x14, 0x1, 0x25}}], 0x18}}], 0x1, 0x0) 03:33:58 executing program 2: r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) ioctl$TIOCSSOFTCAR(r0, 0x4b33, &(0x7f0000000040)) 03:33:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan1\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000640)={0x0, 0x0, &(0x7f0000000600)={&(0x7f0000000540)={0x24, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}, [@NL80211_ATTR_SCAN_FLAGS={0x8, 0x9e, 0xe40}]}, 0x24}}, 0x0) 03:33:58 executing program 7: r0 = socket$inet6(0xa, 0x1, 0x0) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) setsockopt$inet6_IPV6_PKTINFO(r0, 0x29, 0x1b, &(0x7f0000000000)={@dev, r2}, 0x14) r3 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r3, 0x8933, &(0x7f0000000340)={'sit0\x00', 0x0}) setsockopt$inet6_mreq(r0, 0x29, 0x1c, &(0x7f00000000c0)={@dev, r4}, 0x14) 03:33:58 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) utimensat(0xffffffffffffffff, &(0x7f0000000700)='./cgroup.cpu/cgroup.procs\x00', &(0x7f0000000740)={{0x77359400}}, 0x100) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:58 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:58 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 03:33:58 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) setreuid(0xffffffffffffffff, 0xee00) ioctl$KDGKBDIACR(r0, 0x4b36, 0x0) 03:33:58 executing program 6: r0 = add_key$keyring(&(0x7f0000000080), &(0x7f00000000c0)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffffe) request_key(&(0x7f0000000280)='dns_resolver\x00', &(0x7f00000002c0)={'syz', 0x3}, &(0x7f0000000300)='keyring\x00', r0) 03:33:58 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f00000001c0)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_VENDOR(r0, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000040)={0x30, r1, 0x1, 0x0, 0x0, {{0x31}, {@val={0x8, 0x1, 0x49}, @val={0x8, 0x3, r3}, @val={0xc}}}}, 0x30}}, 0x0) 03:33:58 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000140)=@ethtool_rxnfc={0x2e, 0x0, 0x0, {0x0, @udp_ip4_spec={@multicast1, @dev}, {0x0, @link_local}, @esp_ip4_spec={@private, @dev}, {0x0, @dev}}}}) 03:33:58 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:58 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:58 executing program 2: r0 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_init_net_socket$nl_generic(0x10, 0x3, 0x10) r2 = syz_genetlink_get_family_id$nl802154(&(0x7f0000000300), r0) sendmsg$NL802154_CMD_SET_PAN_ID(r1, &(0x7f0000000440)={0x0, 0x0, &(0x7f0000000400)={&(0x7f0000000380)={0x28, r2, 0x1, 0x0, 0x0, {}, [@NL802154_ATTR_IFINDEX={0x8}, @NL802154_ATTR_WPAN_DEV={0xc}]}, 0x28}}, 0x0) 03:33:58 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) readv(r0, &(0x7f0000000080)=[{&(0x7f0000000000)=""/128, 0x80}], 0x1) ioctl$TIOCGPTPEER(r0, 0x5437, 0x0) 03:33:58 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$AUTOFS_DEV_IOCTL_CATATONIC(0xffffffffffffffff, 0xc0189379, 0x0) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x121042, 0x0) fallocate(r1, 0x8, 0x0, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), r0) r3 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r3, 0x8946, &(0x7f0000000140)={'wlan0\x00', &(0x7f00000000c0)=@ethtool_gfeatures}) r4 = openat(0xffffffffffffffff, &(0x7f0000000880)='./file0\x00', 0x200, 0x20) sendfile(0xffffffffffffffff, r3, &(0x7f0000000380)=0x1, 0x0) perf_event_open(&(0x7f0000000080)={0x1, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2000000, 0x4, @perf_bp={&(0x7f0000000040), 0x9}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x7}, 0x18292}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000140)=ANY=[@ANYBLOB="1c000000", @ANYRES16=r2, @ANYBLOB="010000000000000000007e00000008000300", @ANYRES32=0x0, @ANYBLOB], 0x1c}}, 0x0) sendmsg$AUDIT_LIST_RULES(0xffffffffffffffff, 0x0, 0x2000c041) sendmsg$DEVLINK_CMD_SB_OCC_SNAPSHOT(0xffffffffffffffff, 0x0, 0x2000c051) r5 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000180), r1) sendmsg$NL80211_CMD_SET_INTERFACE(r4, &(0x7f0000000240)={&(0x7f0000000100)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000200)={&(0x7f0000000440)={0x38, r5, 0x800, 0x70bd25, 0x25dfdbfe, {{}, {@void, @val={0xc, 0x99, {0x1f, 0x4c}}}}, [@NL80211_ATTR_MESH_ID={0xa}, @NL80211_ATTR_MESH_ID={0xa}]}, 0x38}}, 0x20000804) preadv(0xffffffffffffffff, &(0x7f0000000400)=[{&(0x7f00000003c0)=""/41, 0x29}, {&(0x7f0000000540)=""/253, 0xfd}], 0x2, 0x0, 0x4) 03:33:58 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) write$binfmt_elf64(0xffffffffffffffff, &(0x7f0000000580)={{0x7f, 0x45, 0x4c, 0x46, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40}, [{}]}, 0x78) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 03:33:58 executing program 3: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TIOCL_SETSEL(r0, 0x5412, &(0x7f0000000000)={0x11}) 03:33:59 executing program 1: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x41, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x1, @perf_bp={0x0, 0x4}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) fork() 03:33:59 executing program 6: execveat(0xffffffffffffffff, &(0x7f0000000080)='./file1\x00', &(0x7f0000001300), 0x0, 0x0) 03:33:59 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = epoll_create(0x4) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) epoll_ctl$EPOLL_CTL_ADD(r0, 0x1, r1, &(0x7f0000000240)={0xa0002000}) r2 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) ioctl$TIOCSPTLCK(r2, 0x40045431, &(0x7f0000000040)) r3 = ioctl$TIOCGPTPEER(r2, 0x5441, 0x0) dup2(r3, r0) 03:33:59 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:59 executing program 7: mlock2(&(0x7f0000ff7000/0x4000)=nil, 0x4000, 0x0) mremap(&(0x7f0000ff7000/0x2000)=nil, 0x2000, 0x2000, 0x7, &(0x7f0000ffe000/0x2000)=nil) madvise(&(0x7f0000ffa000/0x3000)=nil, 0x3000, 0x15) 03:33:59 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {r4, 0x2044}, {r3, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:59 executing program 5: syz_emit_ethernet(0x3e, &(0x7f0000000000)={@random="5398acdc7185", @multicast, @void, {@ipv6={0x86dd, @generic={0x0, 0x6, '\b\tR', 0x8, 0x88, 0x0, @dev, @local, {[@srh={0x0, 0x0, 0x4, 0x0, 0x0, 0x0, 0x1}]}}}}}, 0x0) 03:33:59 executing program 2: prctl$PR_GET_TIMERSLACK(0x1e) 03:33:59 executing program 2: r0 = perf_event_open(&(0x7f0000000000)={0x2, 0x80, 0x74, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) close_range(r0, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000640)={0x20a800100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) 03:33:59 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000180)='./cgroup.cpu/cpuset.cpus\x00', 0x2, 0x0) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r3, 0x7000}, {0xffffffffffffffff, 0x2044}, {r3, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:59 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:59 executing program 6: creat(&(0x7f0000000040)='./file0\x00', 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) fsmount(0xffffffffffffffff, 0x0, 0x0) 03:33:59 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(r0, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$incfs(r0, &(0x7f0000000000)='.pending_reads\x00', 0x84140, 0x0) 03:33:59 executing program 7: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 03:33:59 executing program 3: syz_emit_ethernet(0x4a, &(0x7f0000000000)={@local, @dev, @void, {@ipv6={0x86dd, @tcp={0x0, 0x6, "6f1ae7", 0x14, 0x2b, 0x0, @local, @local, {[], {{0x0, 0x4e23, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}}, 0x0) 03:33:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) recvfrom(r0, 0x0, 0x0, 0x20c0, 0x0, 0x0) 03:33:59 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:59 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:33:59 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hci(r1, 0x800448d3, &(0x7f0000000240)) 03:33:59 executing program 3: openat$dir(0xffffffffffffff9c, 0x0, 0x80000, 0xa6) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x203}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) sendfile(r2, r2, 0x0, 0x100000) sendfile(r0, r0, 0x0, 0x100000) 03:33:59 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) sendmsg$NL80211_CMD_START_AP(r0, &(0x7f00000001c0)={0x0, 0x0, &(0x7f0000000200)={&(0x7f0000000000)={0x25, r1, 0x5, 0x0, 0x0, {{}, {@val={0x8}, @void}}, [@NL80211_ATTR_BEACON_INTERVAL={0x8}, @NL80211_ATTR_DTIM_PERIOD={0x8}]}, 0x2c}}, 0x0) 03:33:59 executing program 7: r0 = socket$inet_udplite(0x2, 0x2, 0x88) getsockopt$inet_udp_int(r0, 0x11, 0x0, 0x0, &(0x7f0000000540)) 03:33:59 executing program 5: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xe, &(0x7f0000000040)={0x1, &(0x7f0000000000)=[{0x6}]}) openat$vcs(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$SECCOMP_IOCTL_NOTIF_ADDFD(r0, 0x40182103, 0x0) 03:33:59 executing program 1: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f00000000c0)={0x0, 0x0, &(0x7f00000001c0)=[{&(0x7f0000000000)={0x18, 0x68, 0x1, 0x0, 0x0, "", [@generic="006f75b66e"]}, 0x18}], 0x1}, 0x0) [ 1826.871862] audit: type=1326 audit(2000000039.701:118): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=472741 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe2db446b19 code=0x0 [ 1826.875725] netlink: 1 bytes leftover after parsing attributes in process `syz-executor.6'. 03:33:59 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0xc, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) ioctl$SECCOMP_IOCTL_NOTIF_RECV(r0, 0xc0502100, &(0x7f0000001b00)) 03:33:59 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) ppoll(&(0x7f0000000640)=[{r2, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:33:59 executing program 2: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000100)={{0x1, 0x1, 0x18}, './file0\x00'}) r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) poll(&(0x7f00000007c0)=[{}, {r1, 0x6002}, {0xffffffffffffffff, 0xc001}, {r0}], 0x4, 0x8) 03:33:59 executing program 7: ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x9) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000000300)={0x10000, [{}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "97054973410de7"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(0xffffffffffffffff, 0xd000943e, &(0x7f0000001300)={r2, r0, "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", "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"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000587c0)={0xffffffff, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, 0x0}], 0x0, "2c0a66e365e42f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x7, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}], 0xff, "3e3b3204ece552"}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r6, 0x9) ioctl$TIOCGPKT(r6, 0x80045438, &(0x7f0000000000)) [ 1827.698110] audit: type=1326 audit(2000000040.527:119): auid=0 uid=0 gid=0 ses=4 subj=system_u:system_r:kernel_t:s0 pid=472741 comm="syz-executor.5" exe="/syz-executor.5" sig=31 arch=c000003e syscall=202 compat=0 ip=0x7fe2db446b19 code=0x0 03:34:00 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:00 executing program 6: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f00000003c0)={0x28, 0x26, 0x1, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x1100000001}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x28}], 0x1}, 0x0) 03:34:00 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:00 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) symlink(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)='./file0\x00') 03:34:00 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r1, 0x0, 0x0, 0x9) copy_file_range(r1, 0x0, r1, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:00 executing program 3: openat$dir(0xffffffffffffff9c, 0x0, 0x80000, 0xa6) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x203}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) sendfile(r2, r2, 0x0, 0x100000) sendfile(r0, r0, 0x0, 0x100000) 03:34:00 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$packet(0x11, 0x2, 0x300) ioctl$sock_inet_SIOCGIFBRDADDR(r0, 0x8919, &(0x7f00000002c0)={'syz_tun\x00', {0x2, 0x0, @multicast2}}) 03:34:00 executing program 5: openat$dir(0xffffffffffffff9c, 0x0, 0x80000, 0xa6) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x203}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) sendfile(r2, r2, 0x0, 0x100000) sendfile(r0, r0, 0x0, 0x100000) [ 1827.875607] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.6'. 03:34:00 executing program 0: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r1, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:00 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) mount$9p_unix(0x0, &(0x7f0000000180)='./file1\x00', &(0x7f00000002c0), 0x0, &(0x7f0000000300)={'trans=unix,', {[{@msize={'msize', 0x3d, 0x300000000}}]}}) 03:34:00 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:00 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_audit(0x10, 0x3, 0x9) setsockopt$netlink_NETLINK_DROP_MEMBERSHIP(r0, 0x10e, 0x2, &(0x7f0000000580)=0x1d, 0x4) 03:34:00 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) 03:34:00 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r1, 0x0, 0x0, 0x9) copy_file_range(r1, 0x0, r1, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:00 executing program 0: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:00 executing program 2: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r1, 0x0, 0x0, 0x9) copy_file_range(r1, 0x0, r1, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:00 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:01 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) 03:34:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) r2 = getpid() pidfd_open(r2, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', r4, &(0x7f00000001c0)='./file0\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) openat(r4, &(0x7f0000000180)='./file0\x00', 0x200000, 0x0) clone3(&(0x7f0000000540)={0x8880000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f00000003c0)=""/156, 0x9c, &(0x7f0000000480)=""/170, &(0x7f0000000300)=[r1, r2], 0x2, {r4}}, 0x58) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00') 03:34:01 executing program 0: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:01 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:01 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r1, 0x0, 0x0, 0x9) copy_file_range(r1, 0x0, r1, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:01 executing program 2: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r1, 0x0, 0x0, 0x9) copy_file_range(r1, 0x0, r1, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:01 executing program 5: openat$dir(0xffffffffffffff9c, 0x0, 0x80000, 0xa6) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x203}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) sendfile(r2, r2, 0x0, 0x100000) sendfile(r0, r0, 0x0, 0x100000) 03:34:01 executing program 0: getpid() ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {0xffffffffffffffff, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:01 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) 03:34:01 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:01 executing program 3: openat$dir(0xffffffffffffff9c, 0x0, 0x80000, 0xa6) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x203}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) sendfile(r2, r2, 0x0, 0x100000) sendfile(r0, r0, 0x0, 0x100000) 03:34:01 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) r2 = getpid() pidfd_open(r2, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', r4, &(0x7f00000001c0)='./file0\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) openat(r4, &(0x7f0000000180)='./file0\x00', 0x200000, 0x0) clone3(&(0x7f0000000540)={0x8880000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f00000003c0)=""/156, 0x9c, &(0x7f0000000480)=""/170, &(0x7f0000000300)=[r1, r2], 0x2, {r4}}, 0x58) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00') 03:34:01 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:01 executing program 2: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r1, 0x0, 0x0, 0x9) copy_file_range(r1, 0x0, r1, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:01 executing program 1: r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000080)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) close_range(r0, 0xffffffffffffffff, 0x0) close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) 03:34:01 executing program 7: perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() rt_sigqueueinfo(r0, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r1, 0x0, 0x0, 0x9) copy_file_range(r1, 0x0, r1, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:01 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) r2 = getpid() pidfd_open(r2, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', r4, &(0x7f00000001c0)='./file0\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) openat(r4, &(0x7f0000000180)='./file0\x00', 0x200000, 0x0) clone3(&(0x7f0000000540)={0x8880000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f00000003c0)=""/156, 0x9c, &(0x7f0000000480)=""/170, &(0x7f0000000300)=[r1, r2], 0x2, {r4}}, 0x58) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00') [ 1829.080136] random: crng reseeded on system resumption [ 1829.142858] Restarting kernel threads ... done. 03:34:02 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(0xffffffffffffffff, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:02 executing program 2: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount(0x0, &(0x7f00000000c0)='./file1\x00', &(0x7f0000000000)='devpts\x00', 0x0, 0x0) syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000280)='./file1\x00', 0x0, 0x0, 0x0, 0x460, &(0x7f0000000300)={[{@gid}]}) 03:34:02 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff}) setsockopt$sock_timeval(r0, 0x1, 0x24, &(0x7f0000000400), 0x10) 03:34:02 executing program 5: openat$dir(0xffffffffffffff9c, 0x0, 0x80000, 0xa6) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x203}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) sendfile(r2, r2, 0x0, 0x100000) sendfile(r0, r0, 0x0, 0x100000) 03:34:02 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) r2 = getpid() pidfd_open(r2, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', r4, &(0x7f00000001c0)='./file0\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) openat(r4, &(0x7f0000000180)='./file0\x00', 0x200000, 0x0) clone3(&(0x7f0000000540)={0x8880000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f00000003c0)=""/156, 0x9c, &(0x7f0000000480)=""/170, &(0x7f0000000300)=[r1, r2], 0x2, {r4}}, 0x58) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00') 03:34:02 executing program 0: getpid() ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {0xffffffffffffffff, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:02 executing program 3: openat$dir(0xffffffffffffff9c, 0x0, 0x80000, 0xa6) signalfd4(0xffffffffffffffff, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r1, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) sendfile(0xffffffffffffffff, 0xffffffffffffffff, 0x0, 0x8) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, @perf_config_ext={0x203}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x842, 0x24) sendfile(r2, r2, 0x0, 0x100000) sendfile(r0, r0, 0x0, 0x100000) 03:34:02 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) r2 = getpid() pidfd_open(r2, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', r4, &(0x7f00000001c0)='./file0\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) openat(r4, &(0x7f0000000180)='./file0\x00', 0x200000, 0x0) clone3(&(0x7f0000000540)={0x8880000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f00000003c0)=""/156, 0x9c, &(0x7f0000000480)=""/170, &(0x7f0000000300)=[r1, r2], 0x2, {r4}}, 0x58) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00') [ 1829.630168] random: crng reseeded on system resumption 03:34:02 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:02 executing program 2: r0 = socket$nl_route(0x10, 0x3, 0x0) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000040)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_rxfh_indir={0x39}}) [ 1829.777340] Restarting kernel threads ... done. 03:34:02 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_udp_encap(r0, 0x11, 0x64, &(0x7f0000001100), 0x4) r1 = socket$inet6_udp(0xa, 0x2, 0x0) close(r1) 03:34:02 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:02 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs$namespace(0x0, &(0x7f0000000040)='ns/uts\x00') setns(0xffffffffffffffff, 0x0) lseek(r0, 0x0, 0x0) unlinkat(0xffffffffffffffff, 0x0, 0x0) 03:34:03 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = shmget$private(0x0, 0x2000, 0x54001b05, &(0x7f0000ffa000/0x2000)=nil) shmat(r0, &(0x7f0000400000/0xc00000)=nil, 0x7000) 03:34:03 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff}) setsockopt$sock_int(r0, 0x1, 0xd, &(0x7f0000000380), 0x4) 03:34:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 03:34:03 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) r2 = getpid() pidfd_open(r2, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', r4, &(0x7f00000001c0)='./file0\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) openat(r4, &(0x7f0000000180)='./file0\x00', 0x200000, 0x0) clone3(&(0x7f0000000540)={0x8880000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f00000003c0)=""/156, 0x9c, &(0x7f0000000480)=""/170, &(0x7f0000000300)=[r1, r2], 0x2, {r4}}, 0x58) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00') 03:34:03 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:03 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) ioctl$FIBMAP(0xffffffffffffffff, 0x1, &(0x7f0000000140)=0x3) ioctl$TIOCGPGRP(r0, 0x540f, &(0x7f0000000240)=0x0) r2 = getpid() pidfd_open(r2, 0x0) r3 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r3, 0x6, 0x0, 0x0, 0x0) r4 = fsmount(r3, 0x0, 0x0) symlinkat(&(0x7f0000000200)='./file1\x00', r4, &(0x7f00000001c0)='./file0\x00') openat(r4, &(0x7f00000000c0)='./file0\x00', 0x40, 0x0) ioctl$SNAPSHOT_FREE(r0, 0x3305) openat(r4, &(0x7f0000000180)='./file0\x00', 0x200000, 0x0) clone3(&(0x7f0000000540)={0x8880000, &(0x7f0000000100), &(0x7f00000001c0), &(0x7f0000000200), {0x2c}, &(0x7f00000003c0)=""/156, 0x9c, &(0x7f0000000480)=""/170, &(0x7f0000000300)=[r1, r2], 0x2, {r4}}, 0x58) renameat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, &(0x7f0000000180)='./file1\x00') 03:34:03 executing program 0: getpid() ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {0xffffffffffffffff, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:03 executing program 3: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x2, 0x2800}], 0x0, &(0x7f0000000140)=ANY=[]) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x121242, 0x0) perf_event_open(0x0, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) ioctl$BTRFS_IOC_TREE_SEARCH_V2(0xffffffffffffffff, 0xc0709411, &(0x7f0000001300)=ANY=[@ANYRES64=0x0, @ANYBLOB]) r1 = openat(0xffffffffffffff9c, &(0x7f00000001c0)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r1, &(0x7f0000000240)=ANY=[], 0x23a) ioctl$BTRFS_IOC_SET_FEATURES(0xffffffffffffffff, 0x40309439, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r0, 0x0, 0xfffffdef) [ 1830.539876] random: crng reseeded on system resumption [ 1830.564107] autofs4:pid:474068:autofs_fill_super: called with bogus options [ 1830.602327] autofs4:pid:474098:autofs_fill_super: called with bogus options 03:34:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) [ 1830.687215] Restarting kernel threads ... done. 03:34:03 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) [ 1830.705960] autofs4:pid:474234:autofs_fill_super: called with bogus options 03:34:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 03:34:03 executing program 7: r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) sendmmsg$inet6(r1, &(0x7f0000008480)=[{{&(0x7f0000000000)={0xa, 0x0, 0x0, @loopback}, 0x1c, 0x0}}], 0x1, 0x20002041) close_range(r0, 0xffffffffffffffff, 0x0) [ 1830.803676] autofs4:pid:474287:autofs_fill_super: called with bogus options 03:34:03 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000140)='autofs\x00', 0x0) fsconfig$FSCONFIG_CMD_CREATE(r0, 0x6, 0x0, 0x0, 0x0) 03:34:03 executing program 5: socket$netlink(0x10, 0x3, 0x15) 03:34:03 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) [ 1830.930751] autofs4:pid:474305:autofs_fill_super: called with bogus options 03:34:03 executing program 2: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) stat(&(0x7f0000000300)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) request_key(&(0x7f0000000000)='logon\x00', &(0x7f0000000100)={'syz', 0x1}, &(0x7f0000000140)='user\x00', 0xfffffffffffffffe) 03:34:04 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000140)={0x4, 0x80, 0x0, 0x5, 0x9, 0x5, 0x0, 0xdd2, 0x0, 0x8, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x8001, 0x0, @perf_bp={&(0x7f0000000000), 0x5}, 0x2008, 0x3, 0x9, 0x7, 0x18f, 0x1f, 0xe26, 0x0, 0x1000, 0x0, 0xb8}, 0xffffffffffffffff, 0x1, 0xffffffffffffffff, 0x3) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x820008, 0x0) r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) sendmmsg$inet6(r0, &(0x7f0000002580)=[{{&(0x7f00000013c0)={0xa, 0x0, 0x0, @remote}, 0x1c, &(0x7f0000000140)=[{&(0x7f00000000c0)="d7061e52", 0x4}], 0x1}}, {{&(0x7f0000000040)={0xa, 0x0, 0x0, @private1}, 0x1c, 0x0, 0x0, &(0x7f0000000080)=[@flowinfo={{0x14}}, @rthdrdstopts={{0x20, 0x29, 0x37, {0x0, 0x20000000000001aa, '\x00', [@ra]}}}], 0x38}}], 0x2, 0x0) mount(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f0000000080)='hugetlbfs\x00', 0x0, 0x0) inotify_add_watch(0xffffffffffffffff, &(0x7f0000000400)='./file0\x00', 0x40000020) 03:34:04 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(0xffffffffffffffff, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:04 executing program 3: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000140)=ANY=[], 0x18) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) setsockopt$inet6_IPV6_ADDRFORM(r0, 0x29, 0x1, &(0x7f0000000040), 0x4) 03:34:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x19, 0x0, 0x0) 03:34:04 executing program 6: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl$sock_inet_SIOCRTMSG(r0, 0x8953, 0x0) 03:34:04 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:04 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x15, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) read(r0, &(0x7f0000000100)=""/4096, 0x1000) 03:34:04 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) setsockopt$IP_VS_SO_SET_ZERO(r1, 0x0, 0x2b, 0x0, 0x0) 03:34:04 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:04 executing program 3: r0 = openat$autofs(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r0, 0xc0189375, &(0x7f0000000200)={{0x1, 0x2, 0x18}, './file0\x00'}) 03:34:04 executing program 7: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r1 = openat$sr(0xffffffffffffff9c, &(0x7f00000001c0), 0x105802, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, r1, 0x0) close(r1) shmat(0x0, &(0x7f0000ffc000/0x4000)=nil, 0xcf3caed3d8c7cb92) r2 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r2, &(0x7f0000ff0000/0x3000)=nil, 0x4000) shmctl$SHM_LOCK(r2, 0xb) shmat(r2, &(0x7f0000ff6000/0x4000)=nil, 0x0) shmctl$SHM_LOCK(r2, 0xb) ioctl$SNAPSHOT_S2RAM(0xffffffffffffffff, 0x330b) ioctl$F2FS_IOC_WRITE_CHECKPOINT(r0, 0xf507, 0x0) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff6000/0x4000)=nil, 0x0) sigaltstack(&(0x7f0000fea000/0x4000)=nil, &(0x7f0000000000)) shmctl$SHM_LOCK(r3, 0xb) shmctl$IPC_RMID(r2, 0x0) 03:34:04 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) 03:34:04 executing program 5: timer_create(0x0, &(0x7f0000001500)={0x0, 0x0, 0x42116377d81bb499}, 0x0) [ 1831.643895] autofs4:pid:474627:check_dev_ioctl_version: ioctl control interface version mismatch: kernel(1.1), user(1.2), cmd(0xc0189375) [ 1831.644960] autofs4:pid:474627:validate_dev_ioctl: invalid device control module version supplied for cmd(0xc0189375) 03:34:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x19, 0x0, 0x0) 03:34:04 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xc, 0x0, 0x8d, 0x2, 0x0, 0x100, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x81, 0x1}, 0x8, 0x0, 0xa9, 0x2, 0x2, 0xfffffbff, 0x10, 0x0, 0x6, 0x0, 0x822}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 03:34:04 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f00000002c0)={0x24, r1, 0x17, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x8, 0x5a, 0x0, 0x1, [@NL80211_BAND_60GHZ={0x4}]}]}, 0x24}}, 0x0) 03:34:04 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000000)=""/106, 0x6a) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000003c0)={0x2}) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000500)=@v1={0x1000000, [{0x0, 0x3}]}, 0xc, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f0000000680)}, {0x0}, {0x0}, {&(0x7f0000000540)="9933deac44b3145f58ee1dbc875e3b354ba65352b65e7abf3e952f8229ccd57a7dcea9e8843752cbf5f3fb338bb3798fcd7f2736ccf9b8766894c9ddf3ba9a", 0x3f}, {&(0x7f0000000900)="e88b09e88be10ccf30ad872b6b65f7cf92e60b6535a0aefb3fbc32056ec7b7b0de9d6289b65ba555a84446297b5ebd607c209860f44d", 0x36}], 0x5, 0xe17, 0x400, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:34:04 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:04 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) [ 1831.773761] random: crng reseeded on system resumption [ 1831.794291] random: crng reseeded on system resumption 03:34:04 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) [ 1831.823279] sr 1:0:0:0: [sr0] tag#0 FAILED Result: hostbyte=DID_OK driverbyte=DRIVER_OK cmd_age=0s [ 1831.823954] sr 1:0:0:0: [sr0] tag#0 Sense Key : Not Ready [current] [ 1831.824441] sr 1:0:0:0: [sr0] tag#0 Add. Sense: Medium not present [ 1831.824909] sr 1:0:0:0: [sr0] tag#0 CDB: Read(10) 28 00 00 00 00 00 00 00 40 00 [ 1831.825476] blk_print_req_error: 178 callbacks suppressed [ 1831.825487] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x80700 phys_seg 21 prio class 2 [ 1831.827294] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.828195] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.829274] buffer_io_error: 174 callbacks suppressed [ 1831.829292] Buffer I/O error on dev sr0, logical block 0, async page read [ 1831.832947] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.833691] I/O error, dev sr0, sector 1 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.834774] Buffer I/O error on dev sr0, logical block 1, async page read [ 1831.839971] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.840756] I/O error, dev sr0, sector 2 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.841815] Buffer I/O error on dev sr0, logical block 2, async page read [ 1831.855907] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.856776] I/O error, dev sr0, sector 3 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.857798] Buffer I/O error on dev sr0, logical block 3, async page read [ 1831.861018] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.861466] I/O error, dev sr0, sector 4 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.862049] Buffer I/O error on dev sr0, logical block 4, async page read [ 1831.867227] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.867653] I/O error, dev sr0, sector 5 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.868231] Buffer I/O error on dev sr0, logical block 5, async page read [ 1831.869008] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.869387] I/O error, dev sr0, sector 6 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.870070] Buffer I/O error on dev sr0, logical block 6, async page read [ 1831.870882] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.871265] I/O error, dev sr0, sector 7 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.871872] Buffer I/O error on dev sr0, logical block 7, async page read [ 1831.872800] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.873183] I/O error, dev sr0, sector 0 op 0x0:(READ) flags 0x0 phys_seg 1 prio class 2 [ 1831.873789] Buffer I/O error on dev sr0, logical block 0, async page read [ 1831.876734] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.877113] Buffer I/O error on dev sr0, logical block 1, async page read [ 1831.877977] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.880676] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.881330] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.882771] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:34:04 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x19, 0x0, 0x0) [ 1831.883335] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.885778] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:34:04 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) [ 1831.887886] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.889018] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.892742] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.915921] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.923070] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.928063] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.929937] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.937934] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.944881] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.954292] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.957097] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.958206] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.959234] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.960297] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.961311] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.962433] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.964623] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.965364] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.966808] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.968932] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.969952] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.973124] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.974414] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.975655] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.979070] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.981982] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.984082] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.984978] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.986104] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.988351] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.989820] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.991918] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.995807] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.998632] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1831.999261] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1832.000053] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1832.001139] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1832.001950] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1832.003751] sr 1:0:0:0: [sr0] tag#0 unaligned transfer [ 1832.004348] sr 1:0:0:0: [sr0] tag#0 unaligned transfer 03:34:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xc, 0x0, 0x8d, 0x2, 0x0, 0x100, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x81, 0x1}, 0x8, 0x0, 0xa9, 0x2, 0x2, 0xfffffbff, 0x10, 0x0, 0x6, 0x0, 0x822}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 03:34:05 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) 03:34:05 executing program 5: r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$IPCTNL_MSG_CT_GET_CTRZERO(r0, &(0x7f0000000200)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000040)={0x38, 0x3, 0x1, 0x3, 0x0, 0x0, {0x2}, [@CTA_TUPLE_REPLY={0x24, 0x2, 0x0, 0x1, [@CTA_TUPLE_IP={0x14, 0x1, 0x0, 0x1, @ipv4={{0x8, 0x1, @empty}, {0x8, 0x2, @dev}}}, @CTA_TUPLE_PROTO={0xc, 0x2, 0x0, 0x1, {0x5}}]}]}, 0x38}}, 0x0) 03:34:05 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:05 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x19, 0x0, 0x0) 03:34:05 executing program 7: r0 = socket$nl_route(0x10, 0x3, 0x0) sendmsg$netlink(r0, &(0x7f0000000040)={0x0, 0x0, &(0x7f000000a940)=[{&(0x7f00000003c0)={0x28, 0x2d, 0x1, 0x0, 0x0, "", [@typed={0xc, 0x0, 0x0, 0x0, @u64=0x1100000001}, @typed={0xc, 0x0, 0x0, 0x0, @u64}]}, 0x28}], 0x1}, 0x0) 03:34:05 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:05 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000000)=""/106, 0x6a) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000003c0)={0x2}) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000500)=@v1={0x1000000, [{0x0, 0x3}]}, 0xc, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f0000000680)}, {0x0}, {0x0}, {&(0x7f0000000540)="9933deac44b3145f58ee1dbc875e3b354ba65352b65e7abf3e952f8229ccd57a7dcea9e8843752cbf5f3fb338bb3798fcd7f2736ccf9b8766894c9ddf3ba9a", 0x3f}, {&(0x7f0000000900)="e88b09e88be10ccf30ad872b6b65f7cf92e60b6535a0aefb3fbc32056ec7b7b0de9d6289b65ba555a84446297b5ebd607c209860f44d", 0x36}], 0x5, 0xe17, 0x400, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1832.726175] netlink: 4 bytes leftover after parsing attributes in process `syz-executor.7'. [ 1832.763357] random: crng reseeded on system resumption 03:34:05 executing program 7: r0 = add_key$keyring(&(0x7f0000000240), &(0x7f0000000280)={'syz', 0x0}, 0x0, 0x0, 0xfffffffffffffffd) r1 = add_key$keyring(&(0x7f00000002c0), &(0x7f0000000300)={'syz', 0x1}, 0x0, 0x0, r0) r2 = add_key(&(0x7f0000000000)='dns_resolver\x00', &(0x7f0000000380)={'syz', 0x1}, &(0x7f00000003c0)="18419cc68448de3ae8f97ea6a46d823d4f19cecbf569a58b79851d91f3da031fecf4dfebf4ac3b13988a048b4e35761cb05a5d5b28e1ca6ceebae02cbbf7e894098749d5f99cb226f14f00b6034bfb02a7a5af409f531820bd319b9d7c3405022b550d32ad368fdbbddb8ed631d1dde9a4ed", 0xff10, r1) keyctl$read(0xb, r2, &(0x7f00000000c0)=""/83, 0x53) 03:34:05 executing program 5: syz_mount_image$tmpfs(0x0, &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) newfstatat(0xffffffffffffff9c, &(0x7f0000003ac0)='./file0\x00', &(0x7f0000003fc0)={0x0, 0x0, 0x0, 0x0, 0x0}, 0x0) setresuid(0xee00, r0, r0) setfsuid(0x0) 03:34:05 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000100)={{0x1, 0x1, 0x18, r0, {r0}}, './file1\x00'}) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x0) 03:34:05 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x101042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000000)=0x800f0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 03:34:05 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:05 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xc, 0x0, 0x8d, 0x2, 0x0, 0x100, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x81, 0x1}, 0x8, 0x0, 0xa9, 0x2, 0x2, 0xfffffbff, 0x10, 0x0, 0x6, 0x0, 0x822}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) [ 1832.980975] random: crng reseeded on system resumption 03:34:05 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$PERF_EVENT_IOC_DISABLE(r0, 0x2401, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, r0, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x2400, 0x0) 03:34:05 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:06 executing program 7: r0 = openat$rfkill(0xffffffffffffff9c, &(0x7f0000000000), 0x20801, 0x0) write$rfkill(r0, &(0x7f0000000180)={0x2, 0x0, 0x2}, 0x8) 03:34:06 executing program 6: syz_genetlink_get_family_id$batadv(0x0, 0xffffffffffffffff) r0 = perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = creat(0x0, 0x0) ioctl$EXT4_IOC_GROUP_ADD(r1, 0x40286608, &(0x7f0000000040)) preadv(0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffff) clone3(0x0, 0x0) r2 = clone3(&(0x7f00000001c0)={0x1a3363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) r3 = clone3(&(0x7f00000001c0)={0x1a3363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) kcmp(r2, r3, 0x2, 0xffffffffffffffff, r0) 03:34:06 executing program 5: openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r0, 0x4000) perf_event_open(&(0x7f0000000280)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:06 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) write$binfmt_aout(r0, 0x0, 0x10) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0xc, 0x0, 0x8d, 0x2, 0x0, 0x100, 0x10000, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x2, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x7fffffff, 0x4, @perf_config_ext={0x81, 0x1}, 0x8, 0x0, 0xa9, 0x2, 0x2, 0xfffffbff, 0x10, 0x0, 0x6, 0x0, 0x822}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x8) 03:34:06 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000000)=""/106, 0x6a) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000003c0)={0x2}) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000500)=@v1={0x1000000, [{0x0, 0x3}]}, 0xc, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f0000000680)}, {0x0}, {0x0}, {&(0x7f0000000540)="9933deac44b3145f58ee1dbc875e3b354ba65352b65e7abf3e952f8229ccd57a7dcea9e8843752cbf5f3fb338bb3798fcd7f2736ccf9b8766894c9ddf3ba9a", 0x3f}, {&(0x7f0000000900)="e88b09e88be10ccf30ad872b6b65f7cf92e60b6535a0aefb3fbc32056ec7b7b0de9d6289b65ba555a84446297b5ebd607c209860f44d", 0x36}], 0x5, 0xe17, 0x400, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:34:06 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:06 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000540)={0xee, 0x800}, &(0x7f0000000580)) fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x2) ptrace$setopts(0x4200, r0, 0x0, 0x100067) tkill(r1, 0x38) ptrace$setopts(0x4200, r1, 0x91, 0xc) prlimit64(r0, 0x0, &(0x7f0000000040)={0x800, 0x1}, &(0x7f0000000080)) 03:34:06 executing program 0: r0 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) [ 1833.712244] random: crng reseeded on system resumption 03:34:06 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:06 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x121042, 0x0) pwritev(r0, &(0x7f00000000c0)=[{&(0x7f0000000000)="db", 0x1}], 0x1, 0x8001, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) lseek(r1, 0x2, 0x0) sendfile(r1, r1, 0x0, 0x100000) 03:34:06 executing program 5: syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file2\x00', 0x141042, 0x0) pwritev(r1, &(0x7f0000000640)=[{&(0x7f00000002c0)="02", 0x1}], 0x1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r2, 0x0, 0x0, 0x87ffffc) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r3, &(0x7f0000001180)=ANY=[], 0x220) sendfile(r3, r0, 0x0, 0xfffffdef) 03:34:06 executing program 3: syz_mount_image$tmpfs(&(0x7f0000000080), &(0x7f0000000180)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000040)={[{@mpol={'mpol', 0x3d, {'prefer', '', @val={0x3a, [0xa]}}}}]}) 03:34:06 executing program 6: linkat(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x600) [ 1833.999970] tmpfs: Bad value for 'mpol' [ 1834.008739] tmpfs: Bad value for 'mpol' 03:34:07 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) 03:34:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x20441, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) 03:34:07 executing program 6: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(0xffffffffffffffff, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000580)={0x6c0, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0xc, 0x99, {0x0, 0x3f}}}}, [@NL80211_ATTR_FRAME_MATCH={0x601, 0x5b, "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"}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_TYPE={0x6}, @NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_MATCH={0x75, 0x5b, "578ddd3fa5733b736a6752bcd29685050d7fd1688194b9b2e2f04ab00e6d0332206520d236ad7e27a3856163cd61c04c7c79d1db224eaf30436f995d595e0aeb5c778069ff6d2f0a1b7207fd55034e4dd2e25f68d37fc8ed347b432afb0d821738e0f7adaaf3d91bb4897d859f58613347"}]}, 0x6c0}}, 0x0) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000140), 0xffffffffffffffff) sendmsg$NL80211_CMD_FRAME(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f00000001c0)={&(0x7f0000000500)=ANY=[@ANYBLOB="00010000", @ANYRES16=r2, @ANYBLOB="010000000000000000003b00000008000300", @ANYRES32=r1, @ANYBLOB="e200330080800000080211000001080211"], 0x100}}, 0x0) 03:34:07 executing program 2: pipe2(&(0x7f0000000140)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fcntl$setownex(0xffffffffffffffff, 0xf, &(0x7f0000000040)) getdents64(r0, &(0x7f0000000000)=""/106, 0x6a) ioctl$FS_IOC_MEASURE_VERITY(0xffffffffffffffff, 0xc0046686, &(0x7f00000003c0)={0x2}) fsetxattr$security_capability(0xffffffffffffffff, 0x0, &(0x7f0000000500)=@v1={0x1000000, [{0x0, 0x3}]}, 0xc, 0x0) pwritev2(0xffffffffffffffff, &(0x7f0000000a00)=[{&(0x7f0000000680)}, {0x0}, {0x0}, {&(0x7f0000000540)="9933deac44b3145f58ee1dbc875e3b354ba65352b65e7abf3e952f8229ccd57a7dcea9e8843752cbf5f3fb338bb3798fcd7f2736ccf9b8766894c9ddf3ba9a", 0x3f}, {&(0x7f0000000900)="e88b09e88be10ccf30ad872b6b65f7cf92e60b6535a0aefb3fbc32056ec7b7b0de9d6289b65ba555a84446297b5ebd607c209860f44d", 0x36}], 0x5, 0xe17, 0x400, 0x0) recvmmsg$unix(0xffffffffffffffff, &(0x7f0000000340), 0x0, 0x0, &(0x7f0000000380)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:34:07 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000540)={0xee, 0x800}, &(0x7f0000000580)) fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x2) ptrace$setopts(0x4200, r0, 0x0, 0x100067) tkill(r1, 0x38) ptrace$setopts(0x4200, r1, 0x91, 0xc) prlimit64(r0, 0x0, &(0x7f0000000040)={0x800, 0x1}, &(0x7f0000000080)) 03:34:07 executing program 5: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) epoll_create1(0x80000) mmap$IORING_OFF_SQES(&(0x7f0000ffc000/0x4000)=nil, 0x4000, 0x1000004, 0x10, 0xffffffffffffffff, 0x10000000) ioctl$ifreq_SIOCGIFINDEX_team(0xffffffffffffffff, 0x8933, 0x0) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000e80)={'wlan0\x00'}) syz_genetlink_get_family_id$nl80211(&(0x7f0000001040), 0xffffffffffffffff) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f0000001140)={0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x4000001}, 0x0) syz_io_uring_setup(0x7753, &(0x7f00000013c0)={0x0, 0x0, 0x1}, &(0x7f0000ffd000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000001440), &(0x7f0000001480)) 03:34:07 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:07 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:07 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) 03:34:07 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:07 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:07 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x20441, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) 03:34:07 executing program 6: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) 03:34:07 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) 03:34:08 executing program 6: syz_mount_image$tmpfs(0x0, &(0x7f00000005c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pivot_root(&(0x7f0000001900)='./file0\x00', &(0x7f0000001940)='./file0\x00') 03:34:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x20441, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) 03:34:08 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:08 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) open_by_handle_at(r0, &(0x7f0000000080)=@reiserfs_2={0x8, 0x2, {0x8}}, 0x0) 03:34:08 executing program 7: r0 = syz_open_dev$sg(&(0x7f0000001000), 0x0, 0x0) ioctl$SG_EMULATED_HOST(r0, 0x2203, &(0x7f0000000000)) 03:34:08 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000540)={0xee, 0x800}, &(0x7f0000000580)) fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x2) ptrace$setopts(0x4200, r0, 0x0, 0x100067) tkill(r1, 0x38) ptrace$setopts(0x4200, r1, 0x91, 0xc) prlimit64(r0, 0x0, &(0x7f0000000040)={0x800, 0x1}, &(0x7f0000000080)) 03:34:08 executing program 6: r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$KDSETKEYCODE(r0, 0x4b4d, &(0x7f0000000140)={0xfffffffc}) 03:34:08 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:08 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x1ff) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000200)='./file1\x00', 0x2, 0x0) write$binfmt_script(r0, &(0x7f0000000000)={'#! ', './file1', [{}]}, 0xc) close(r0) execveat(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0x0, 0x0, 0x0) 03:34:08 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x0, 0x10000) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00e1\x00']) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, r1, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:34:08 executing program 7: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) getsockopt$bt_hci(r0, 0x0, 0x3, &(0x7f0000000000)=""/16, &(0x7f0000000040)=0x10) 03:34:08 executing program 6: syz_emit_ethernet(0x3a, &(0x7f0000000300)={@local, @random="b12361026e6a", @void, {@ipv4={0x800, @tcp={{0x6, 0x4, 0x0, 0x0, 0x2c, 0x0, 0x0, 0x0, 0x2, 0x0, @dev, @dev, {[@timestamp={0x44, 0x4}]}}, {{0x0, 0x0, 0x41424344, 0x41424344, 0x0, 0x0, 0x5}}}}}}, 0x0) 03:34:08 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hci(r1, 0x800448f0, &(0x7f0000000000)="a6") 03:34:08 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) write(0xffffffffffffffff, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r2 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r2, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r3, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r3, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:08 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) openat$vcsu(0xffffffffffffff9c, &(0x7f0000000240), 0x20441, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$unix(0x1, 0x1, 0x0) bind$unix(r0, &(0x7f00000000c0)=@file={0x1, './file0\x00'}, 0x6e) listen(r0, 0x0) 03:34:09 executing program 7: syz_io_uring_setup(0xfa7, &(0x7f0000000080), &(0x7f0000ffc000/0x3000)=nil, &(0x7f0000ffe000/0x1000)=nil, 0x0, 0x0) r0 = shmget$private(0x0, 0x4000, 0x0, &(0x7f0000ffc000/0x4000)=nil) shmat(r0, &(0x7f0000ff9000/0x4000)=nil, 0x4000) move_pages(0x0, 0x1, &(0x7f0000001540)=[&(0x7f0000ffc000/0x4000)=nil], 0x0, &(0x7f0000000000), 0x0) 03:34:09 executing program 6: setitimer(0x0, &(0x7f0000000040)={{0x0, 0xea60}, {0x77359400}}, 0x0) getitimer(0x0, &(0x7f00000000c0)) 03:34:09 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x9bab}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bind$packet(0xffffffffffffffff, &(0x7f0000000000)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @random="94031c855deb"}, 0x14) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) syz_mount_image$ext4(&(0x7f0000000480)='ext4\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000680)=ANY=[]) connect$inet6(0xffffffffffffffff, &(0x7f0000000000)={0xa, 0x4e20, 0x0, @loopback}, 0x1c) sendmmsg$inet6(0xffffffffffffffff, &(0x7f0000008480)=[{{0x0, 0x0, &(0x7f0000000240)=[{&(0x7f0000000080)=' ', 0x1}], 0x1}}], 0x1, 0x0) recvmmsg(0xffffffffffffffff, &(0x7f0000006200)=[{{0x0, 0x0, &(0x7f0000004380)=[{&(0x7f0000000380)=""/28, 0x1c}], 0x1}}], 0x1, 0x0, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) chown(&(0x7f0000000440)='./file1\x00', 0x0, 0x0) [ 1836.450081] No source specified [ 1836.486927] No source specified 03:34:09 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, 0x0, 0x0, 0x4000, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) setxattr$security_capability(&(0x7f0000000040)='./file1\x00', &(0x7f0000000240), &(0x7f0000000400)=@v2={0x2000000, [{0x1}, {0x1, 0x20000000}]}, 0x14, 0x2) r3 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r2, 0x2, 0x0) openat$binderfs(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r4 = memfd_create(&(0x7f0000000380)='security\t\xe0\xd3\xb8C\x92\xb2\x9d\xfa\x00\x00\xf9ekv\x064pability\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) sendfile(r3, r1, &(0x7f00000000c0)=0x3, 0x6) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x0, 0x0, 0xa6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) pivot_root(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./file1\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000001c0)={0x6a4, 0xa5, 0x20, 0x40, 0xffffffe0}) sendfile(r0, r0, 0x0, 0x100000) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) 03:34:09 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:09 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hci(r1, 0x800448f0, &(0x7f0000000000)="a6") 03:34:09 executing program 6: clock_adjtime(0xb00, &(0x7f0000000100)) 03:34:09 executing program 3: syz_usb_connect(0x0, 0x24, &(0x7f0000000600)={{0x12, 0x1, 0x0, 0x65, 0xe1, 0x21, 0x0, 0x16d8, 0x6803, 0x7b0a, 0x1, 0x2, 0x3, 0x1, [{{0x9, 0x2, 0x12, 0x1, 0x0, 0x0, 0x0, 0x0, [{{0x9, 0x4, 0x0, 0x0, 0x0, 0xb2, 0x72, 0x70}}]}}]}}, 0x0) 03:34:09 executing program 1: prlimit64(0x0, 0x0, &(0x7f0000000540)={0xee, 0x800}, &(0x7f0000000580)) fork() ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000000)=0x0) r1 = fork() ptrace$setopts(0x4206, r1, 0x0, 0x2) ptrace$setopts(0x4200, r0, 0x0, 0x100067) tkill(r1, 0x38) ptrace$setopts(0x4200, r1, 0x91, 0xc) prlimit64(r0, 0x0, &(0x7f0000000040)={0x800, 0x1}, &(0x7f0000000080)) 03:34:09 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:09 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x0, 0x10000) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00e1\x00']) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, r1, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) [ 1837.036861] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1837.038672] misc raw-gadget: fail, usb_gadget_register_driver returned -16 03:34:09 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYRES64, @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077b9e465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r3) ioctl$CDROMSTOP(0xffffffffffffffff, 0x5307) 03:34:09 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hci(r1, 0x800448f0, &(0x7f0000000000)="a6") 03:34:10 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:10 executing program 2: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) ioctl$sock_bt_hci(r1, 0x800448f0, &(0x7f0000000000)="a6") 03:34:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=' '], 0x6) 03:34:10 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) [ 1837.556354] UDC core: USB Raw Gadget: couldn't find an available UDC or it's busy [ 1837.563058] misc raw-gadget: fail, usb_gadget_register_driver returned -16 03:34:10 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}], 0x6, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:10 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:10 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x0, 0x10000) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00e1\x00']) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, r1, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:34:10 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYRES64, @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077b9e465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r3) ioctl$CDROMSTOP(0xffffffffffffffff, 0x5307) 03:34:10 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, 0x0, 0x0, 0x4000, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) setxattr$security_capability(&(0x7f0000000040)='./file1\x00', &(0x7f0000000240), &(0x7f0000000400)=@v2={0x2000000, [{0x1}, {0x1, 0x20000000}]}, 0x14, 0x2) r3 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r2, 0x2, 0x0) openat$binderfs(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r4 = memfd_create(&(0x7f0000000380)='security\t\xe0\xd3\xb8C\x92\xb2\x9d\xfa\x00\x00\xf9ekv\x064pability\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) sendfile(r3, r1, &(0x7f00000000c0)=0x3, 0x6) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x0, 0x0, 0xa6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) pivot_root(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./file1\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000001c0)={0x6a4, 0xa5, 0x20, 0x40, 0xffffffe0}) sendfile(r0, r0, 0x0, 0x100000) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) 03:34:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=' '], 0x6) 03:34:10 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f0000000000)={'lo\x00', &(0x7f0000000740)=@ethtool_link_settings={0x4d}}) 03:34:10 executing program 2: r0 = socket$inet6(0xa, 0x1, 0x0) setsockopt$inet6_IPV6_DSTOPTS(r0, 0x29, 0x3b, &(0x7f0000000080), 0x8) setsockopt$inet6_IPV6_HOPOPTS(r0, 0x29, 0x3b, &(0x7f0000000040), 0x8) 03:34:10 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=' '], 0x6) 03:34:10 executing program 3: syz_genetlink_get_family_id$nl80211(0x0, 0xffffffffffffffff) 03:34:10 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0xc0f85403, 0x0) 03:34:10 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:10 executing program 1: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) write$bt_hci(r1, &(0x7f0000000100)=ANY=[@ANYBLOB=' '], 0x6) 03:34:10 executing program 3: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0xc0f85403, 0x0) 03:34:11 executing program 5: ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, &(0x7f0000000340)) r0 = socket$inet6(0xa, 0x0, 0x10000) sendfile(0xffffffffffffffff, r0, &(0x7f0000000000), 0x81) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, &(0x7f00000004c0)) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x2, 0x7, 0x0, 0x8}) epoll_create(0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(r1, 0xc0189375, &(0x7f00000000c0)=ANY=[@ANYBLOB="010000000100000018000000", @ANYRES32=r1, @ANYBLOB='\x00\x00\x00\x00\x00\x00e1\x00']) ioctl$TCSBRK(r2, 0x5409, 0x8001) mmap(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x200000a, 0x1010, r1, 0x29287000) dup(0xffffffffffffffff) socket$inet6_icmp_raw(0xa, 0x3, 0x3a) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfffffffffffffffe}, 0x40510, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000004c00)={0xc0002100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 03:34:11 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0xc0f85403, 0x0) 03:34:11 executing program 3: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:11 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, 0x0, 0x0, 0x4000, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) setxattr$security_capability(&(0x7f0000000040)='./file1\x00', &(0x7f0000000240), &(0x7f0000000400)=@v2={0x2000000, [{0x1}, {0x1, 0x20000000}]}, 0x14, 0x2) r3 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r2, 0x2, 0x0) openat$binderfs(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r4 = memfd_create(&(0x7f0000000380)='security\t\xe0\xd3\xb8C\x92\xb2\x9d\xfa\x00\x00\xf9ekv\x064pability\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) sendfile(r3, r1, &(0x7f00000000c0)=0x3, 0x6) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x0, 0x0, 0xa6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) pivot_root(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./file1\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000001c0)={0x6a4, 0xa5, 0x20, 0x40, 0xffffffe0}) sendfile(r0, r0, 0x0, 0x100000) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) 03:34:11 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYRES64, @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077b9e465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r3) ioctl$CDROMSTOP(0xffffffffffffffff, 0x5307) 03:34:11 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}], 0x6, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:11 executing program 1: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:11 executing program 2: r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000280), 0x0) ioctl$SNDRV_TIMER_IOCTL_PARAMS(r0, 0xc0f85403, 0x0) 03:34:11 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:11 executing program 3: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:11 executing program 1: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:11 executing program 2: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:11 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:12 executing program 3: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:12 executing program 1: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:12 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:12 executing program 2: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:12 executing program 3: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:12 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount(0x0, 0x0, 0x0, 0x4000, 0x0) r2 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x1f, 0x0, 0x3, 0x0, 0x0, 0x2, 0x10, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0x1}, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xfffffffffffffffe}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0xc) setxattr$security_capability(&(0x7f0000000040)='./file1\x00', &(0x7f0000000240), &(0x7f0000000400)=@v2={0x2000000, [{0x1}, {0x1, 0x20000000}]}, 0x14, 0x2) r3 = openat$pidfd(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$setflags(r2, 0x2, 0x0) openat$binderfs(0xffffffffffffff9c, 0xfffffffffffffffc, 0x0, 0x0) socket$unix(0x1, 0x1, 0x0) r4 = memfd_create(&(0x7f0000000380)='security\t\xe0\xd3\xb8C\x92\xb2\x9d\xfa\x00\x00\xf9ekv\x064pability\x00', 0x0) openat$autofs(0xffffffffffffff9c, &(0x7f00000003c0), 0x20000, 0x0) fcntl$dupfd(0xffffffffffffffff, 0x406, r4) sendfile(r3, r1, &(0x7f00000000c0)=0x3, 0x6) pwritev(r1, &(0x7f0000000080)=[{&(0x7f0000000140)='\x00', 0x1a}], 0x1, 0x7fffffc, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0xa0014, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000000), 0x9}, 0x0, 0x0, 0x0, 0x0, 0xa6}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = socket$inet_tcp(0x2, 0x1, 0x0) pivot_root(&(0x7f0000000200)='./file1\x00', &(0x7f0000000300)='./file1\x00') ioctl$FS_IOC_FSSETXATTR(r5, 0x401c5820, &(0x7f00000001c0)={0x6a4, 0xa5, 0x20, 0x40, 0xffffffe0}) sendfile(r0, r0, 0x0, 0x100000) ioctl$sock_SIOCOUTQNSD(0xffffffffffffffff, 0x894b, &(0x7f0000000180)) 03:34:12 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x4, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYRES64, @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077b9e465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) r0 = openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) r3 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r3) ioctl$CDROMSTOP(0xffffffffffffffff, 0x5307) 03:34:12 executing program 5: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:12 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}], 0x6, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:12 executing program 1: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mount$cgroup(0x0, &(0x7f0000000840)='./file1\x00', &(0x7f0000000880), 0x0, &(0x7f0000000a00)={[{@release_agent={'release_agent', 0x3d, './file1'}}, {@release_agent={'release_agent', 0x3d, './file2'}}]}) [ 1839.822419] cgroup: release_agent respecified [ 1839.833160] cgroup: release_agent respecified 03:34:12 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:12 executing program 1: syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b0000000001", 0x5a, 0x400}, {&(0x7f0000010400)="020000000300000004", 0x9, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000012c00)) setxattr$security_evm(&(0x7f0000000080)='./file0\x00', &(0x7f0000000180), 0x0, 0x0, 0x0) 03:34:12 executing program 3: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:12 executing program 2: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:12 executing program 5: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:12 executing program 1: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:12 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:13 executing program 3: r0 = perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() rt_sigqueueinfo(r1, 0x11, &(0x7f0000000080)) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = memfd_create(&(0x7f0000000740)='B\xdb/\x89\x03l\xdeb\xcb\xb54\xed\xbeLY\xb5Z\xe1\x12S\xf5G\xcc\xf3\xe9\x02h\v\xca(\x96\xe1C\xdf\x1c\xea\x85C\xfb\x10\x13\xfa\x03\x16\xcd\x17\xa2\x80\xa1z\xb4r\x95\xc3@\x9d\xa6\xf1\x92#}g\xd3`\xf7\xcez\xcb\xb3\x1a\xbb\xc48e\x8e\xb1&\xd1\x8a\xe6!\x7f\x8d\xea,qx\xa28\xbf\"\xc7e\x06L\xb06\xeb<$\xd7\xba\xe5\x01\x03\x94r\xab\xd4J\x03s\xaf\xf6A\xbfV\xfa\x1ew\x8d\xbf\x99I\x97\xd8\xd2\xe8\x11\xc4\x04\x00\x84\xd5i\xee\xaf\xae[E\x1f\xdd\xd7#rT+\xb62!p\xaf[\x99\" 1\xeb\xc7)\xd2\x1dh\xf2\xd5s\xfd?\fa>\x9f;\xe5r\xe5\xbd\xb0|=\x8eZcPY\xf8\xbd\x13\xaa\x8b\xdf\xbc\x93u\xd5\xb0r\xfb\xde\xe7\xd9k\xe2\xc6\x1b\xf2o@&>\xf2M\xe7\x8c\xeb\xee\xf5\x02~\x85\x14\xf3\xc6v\xf15PE\x8c\xca\x16$\xc2\x01#\xb563\rbq\xbf64\xfaW\x17\xdfa\xe6\xca\x86\xd7\xf8\x81X\x9bg4\xc1\xdam\xcf=Rq6\xb0\xd4D=I\x1a\x0e\xd0\xabz\xe2\x19\x0fM\xad\xdco\xa4\xb2\x8c?\xc1\x10\xf273\xd00\xb3_\xe8\x9a*\xfcL\xea;\xc0\x9a\xdbx!N;\xb5x\t\xa4E\xbe\x93r\x04\xf5\xf0\xf5\x7f\x9a)\xf5\x1b\"\xa1\xd8\x06>\xc9\xe2r\xe9_\xfe\xc0\b\x81\x98\x1c\xe2\xe0?\x8f\xa1\xbel\aN\x83@\xb1\x03)4A\x83\xc6\xcf\xf6\xb5\x82\xb7\x9dA\b$\xa2x\x8a@\xfa\x04\\3j~\xef\x93\xb1/L\x01\xe2\xba|\xf0\x01)PP\xcdl\x06\xfc\x15;qZ\xb1u\xc9\xd0\xd16~JEGm\xe4\x1e@\x9dG\xe4@\xdf\xba\'\x8b\x1cD\xc7\xec\xd1@}tR\xd9P\xf4N\xe3\xd8x\xa0\x91\x17\xc2}\x13\b\xca\t(Z\xa3_\xa1\x90\x15T\x93\xe7%\x98\xa7\xfb\x8bp/eq\x93\xbf\x1f =|\xf3\xb1\xfcR\xd8\nM,\xcb%@\'\x15\x88\xd8\xad\f\x91|\x95\x8fq+\x98\x81W\xba\x9f\xe0elOt\xbd\by\r\x87\x1c\xba\xbd\x8e+S>\xb8\xe29\x91h^x\xfb`\x00\xdd/\xa6\xb1\x16=\xa1bw\xc5I\xb1\x00'/552, 0x0) fallocate(r2, 0x0, 0x0, 0x9) ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000040)={{0x1, 0x1, 0x18, r0, {0x80000000}}, './file0\x00'}) copy_file_range(r2, 0x0, r2, &(0x7f0000000000)=0x53, 0x3f, 0x0) 03:34:13 executing program 2: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:13 executing program 5: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:13 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000040)='net/anycast6\x00') pread64(r0, &(0x7f0000000080)=""/78, 0x5, 0xaa2) 03:34:13 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$ext4(&(0x7f0000000000)='ext4\x00', &(0x7f0000000100)='./file0\x00', 0x40000, 0x3, &(0x7f0000000200)=[{&(0x7f0000010000)="2000000080000000060000006a0000000f000000000000000100000001000000004000000040000020000000e0f4655fe0f4655f0100ffff53ef010001000000dff4655f000000000000000001000000000000000b000000000100", 0x5b, 0x400}, {&(0x7f0000010400)="02000000030000000400", 0xa, 0x800}, {&(0x7f0000011600)="ed41000000080000dff4655fe0f4655fe0f4655f000000000000040004", 0x1d, 0x2100}], 0x0, &(0x7f0000000300)=ANY=[@ANYBLOB="00efe2fe00d3130ae5a8649fc09955f60a56b7f95c7cb2bdda4c75af029fcc0fb641d90d2b9c35a3b8d41e4837a443bf227f9a274a58ef115ada1b180a02ce37c0ebe8fd112552a082b190d4e8ddc0f7be4e361f9cebc6b9ab47a063ac33952f7c7f004f2befe8db819ea2959e1225592e2168855583aeb3789f8e4fa792b5e8d960e8df383672c1da"]) mount$9p_fd(0x0, &(0x7f0000000140)='./file0\x00', 0x0, 0x0, 0x0) 03:34:13 executing program 6: r0 = syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) r1 = dup(r0) bind$bt_hci(r1, &(0x7f0000000080)={0x1f, 0xffffffffffffffff, 0x3}, 0x6) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_script(r2, &(0x7f0000000180)=ANY=[], 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x65902eae3ec94454, 0x401a012, r3, 0x0) write$bt_hci(r1, &(0x7f0000000040)={0x1, @write_le_host_supported={{0xc6d, 0x2}}}, 0x6) 03:34:13 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) r2 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) sendmsg$NL80211_CMD_GET_FTM_RESPONDER_STATS(r0, &(0x7f00000003c0)={0x0, 0x0, &(0x7f0000000380)={&(0x7f0000000340)={0x1c, r2, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r1}, @void}}}, 0x1c}}, 0x0) 03:34:13 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {0xffffffffffffffff, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:13 executing program 6: r0 = memfd_create(&(0x7f0000000100)='/d#>\xbb\xb3~\x89\xa4O{\xc3\xad *Zn\xad\x11\xf2u\xe3\xf5\xbd\x1d\xa5\xeb\xee\xeee\xf4\xaf\xf0\x81\xea|f\x1c\xe0\xc1\xd1\x19cr\xa1\x01\xc3g\x10#\xa1\xfa\xb2\xe7\xa4+\x9e\xd7\xa2\x04y\xc1\xcf-V\xc0\x18Ls\xe2I\x19:\xe7\xc6F\x96xM\x1a\x00\x00\x00\x9c*\x03\x1f\x94\x9a\xf1\xcb\xc9\xf1\x16I\x85\xc8x\xe0\xc7\xc7z\xfa\t\x85\t\xfc\xcc\v\xce\x1b\xa2\x1b\xb4+\xe7\xb4M\xf4\xa4\xef\x0eW\x7f\x13\xa9>\xcf;+-\xf1gT\xd0\xcc\xff#\x1b\xbc\xe2\x06\xdf\xc2\xcb \x149n\xf24x\xe4\x9b\xab\xf7E\x1c\xb2,\xec[|\xcc\x85{\xb3\x98\x139\xc4F\x9fE\xa7*\xa2\xc8\xa9H\xed\x9b@\x8bH\xe5\xb5\xa7\xae\x11\xa7N\x00\x00\x04\x00\x00\x00\x00\x00\x00', 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x0, 0x401a012, r0, 0x0) futimesat(0xffffffffffffffff, 0x0, &(0x7f0000000300)) 03:34:13 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:13 executing program 5: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:13 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) lgetxattr(&(0x7f0000000180)='./file1\x00', 0x0, 0x0, 0x0) 03:34:13 executing program 2: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:14 executing program 3: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) getgroups(0x2, &(0x7f0000000840)=[0x0, 0xee01]) setgroups(0x3, &(0x7f0000000480)=[0x0, r1, 0x0]) fchown(r0, 0xffffffffffffffff, r1) 03:34:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xca, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = dup3(r1, r0, 0x0) ioctl$sock_SIOCETHTOOL(r2, 0x8946, &(0x7f0000000080)={'syz_tun\x00', &(0x7f0000000000)=@ethtool_sset_info={0xf, 0x0, 0x2}}) 03:34:14 executing program 2: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x5, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000300)="f429ddc763860ace1fe93d585f675cbe4006dff70ad05cd49d0b3cb4b52853809fde52065d74d8ec7624530f3321d87b5b03bc29406a83bae2eac39306bfe315213b9b90b1df7d69766d7cf4062f0514dd93d0dad1ba903299f6ca7238c8c409bac1734e9647a99de22eb0", 0x6b, 0x6}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='sb=0x0000000000000009,noauto_da_alloc,errors=remount-ro,grpid,resgid=', @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077cae465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_unix(&(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), 0x2120010, &(0x7f0000000440)={'trans=unix,', {[{@cache_fscache}, {@version_u}, {@cachetag={'cachetag', 0x3d, 'vfat\x00'}}, {@access_client}, {@posixacl}, {@nodevmap}, {@access_any}], [{@subj_type={'subj_type', 0x3d, '\xff\xff'}}, {@subj_user={'subj_user', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) socket$inet6_udp(0xa, 0x2, 0x0) 03:34:14 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:14 executing program 1: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:14 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {0xffffffffffffffff, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) sendfile(r0, r0, &(0x7f0000000000)=0x2000000000003, 0x0) 03:34:14 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x11, r0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) mmap(&(0x7f0000000000/0x4000)=nil, 0x4000, 0x1000002, 0x401a012, r1, 0x0) pkey_mprotect(&(0x7f0000001000/0x1000)=nil, 0x1000, 0x0, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000ffd000/0x2000)=nil, 0x2000, 0x4, 0xffffffffffffffff) pkey_mprotect(&(0x7f0000001000/0x2000)=nil, 0x2000, 0x0, 0xffffffffffffffff) 03:34:14 executing program 3: socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000380)={0xffffffffffffffff, 0xffffffffffffffff}) sendmmsg$inet(r1, &(0x7f0000000440)=[{{0x0, 0x0, &(0x7f00000014c0)=[{&(0x7f0000000000)="d0", 0x1}], 0x1}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000000c40)=[{{0x0, 0x0, &(0x7f0000000480)=[{&(0x7f0000000100)=""/17, 0x11}], 0x300, &(0x7f0000000500)=""/217, 0xd9}}], 0x1, 0x0, 0x0) 03:34:14 executing program 4: r0 = getpid() read(0xffffffffffffffff, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0)=r0, 0x12) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(0xffffffffffffffff, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:14 executing program 2: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f00000030c0), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_PORT(r0, 0xc0a85352, &(0x7f0000003240)={{0x0, 0x5}, 'port0\x00'}) 03:34:14 executing program 7: syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000200)='\x00', &(0x7f00000002c0)='./file0\x00', &(0x7f0000000300), 0x0, &(0x7f00000007c0)) 03:34:14 executing program 3: r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000001840)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x84138, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x8, 0xffffffffffff2544}, 0xa0a, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000000)={0x1, 0x80, 0x2, 0x80, 0x9, 0x1, 0x0, 0x1, 0x4, 0x2, 0x0, 0x1, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x8, 0x4, @perf_config_ext={0x7fffffff, 0x4}, 0x18, 0xffffffffffffffff, 0x0, 0x1, 0x5, 0x1, 0xa98, 0x0, 0x6, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x2) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000200)={0x77359400}, 0x10) 03:34:14 executing program 4: r0 = getpid() read(0xffffffffffffffff, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0)=r0, 0x12) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(0xffffffffffffffff, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:14 executing program 5: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) 03:34:15 executing program 1: ioctl$TIOCSIG(0xffffffffffffffff, 0x40045436, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e1e, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY_EX(r1, 0xc0096616, &(0x7f0000000000)={0x4, [0x0, 0x0, 0x0, 0x0]}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) ftruncate(r2, 0x0) ioctl$TIOCGPKT(r2, 0x80045438, 0x0) 03:34:15 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_MCAST_MSFILTER(r0, 0x29, 0x30, &(0x7f0000000100)={0x0, {{0xa, 0x0, 0x0, @mcast1}}, 0x0, 0x2}, 0x90) 03:34:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x1036e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000100)) ioctl$EXT4_IOC_GET_ES_CACHE(r0, 0xc020662a, &(0x7f0000000140)=ANY=[@ANYBLOB="04000000ff0f00000000000004"]) 03:34:15 executing program 4: r0 = getpid() read(0xffffffffffffffff, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0)=r0, 0x12) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(0xffffffffffffffff, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:15 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x5, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000300)="f429ddc763860ace1fe93d585f675cbe4006dff70ad05cd49d0b3cb4b52853809fde52065d74d8ec7624530f3321d87b5b03bc29406a83bae2eac39306bfe315213b9b90b1df7d69766d7cf4062f0514dd93d0dad1ba903299f6ca7238c8c409bac1734e9647a99de22eb0", 0x6b, 0x6}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='sb=0x0000000000000009,noauto_da_alloc,errors=remount-ro,grpid,resgid=', @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077cae465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_unix(&(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), 0x2120010, &(0x7f0000000440)={'trans=unix,', {[{@cache_fscache}, {@version_u}, {@cachetag={'cachetag', 0x3d, 'vfat\x00'}}, {@access_client}, {@posixacl}, {@nodevmap}, {@access_any}], [{@subj_type={'subj_type', 0x3d, '\xff\xff'}}, {@subj_user={'subj_user', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) socket$inet6_udp(0xa, 0x2, 0x0) 03:34:15 executing program 5: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) 03:34:15 executing program 3: syslog(0x2, &(0x7f0000000300)=""/217, 0xd9) 03:34:15 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {0xffffffffffffffff, 0x3550}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:15 executing program 5: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) 03:34:15 executing program 2: sysfs$2(0x2, 0x0, &(0x7f0000000240)=""/227) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) syz_mount_image$vfat(0x0, 0x0, 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f00000004c0)}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000640)=ANY=[]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$LOOP_CTL_REMOVE(0xffffffffffffffff, 0x4c81, 0xb) r1 = signalfd4(0xffffffffffffffff, &(0x7f0000000200), 0x8, 0x0) openat(r1, &(0x7f0000000340)='./file0/file0\x00', 0x400000, 0x4c) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 03:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:15 executing program 7: r0 = socket$inet6_icmp_raw(0xa, 0x3, 0x3a) ioctl$sock_SIOCETHTOOL(r0, 0x8946, &(0x7f00000000c0)={'wlan1\x00', &(0x7f0000000000)=@ethtool_gstrings={0x2}}) 03:34:15 executing program 5: arch_prctl$ARCH_GET_FS(0x1003, &(0x7f0000000640)) 03:34:15 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:15 executing program 7: io_setup(0xd29, &(0x7f0000000780)=0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x1255c2, 0x0) io_submit(r0, 0x1, &(0x7f0000000040)=[&(0x7f0000000200)={0x0, 0x0, 0x0, 0x8, 0x0, r1, &(0x7f0000000000)="1c", 0xf}]) 03:34:16 executing program 4: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:16 executing program 1: r0 = syz_open_dev$evdev(&(0x7f00000002c0), 0x0, 0x103001) write$binfmt_aout(r0, &(0x7f0000001380)=ANY=[@ANYBLOB="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"], 0x129) 03:34:16 executing program 3: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000240)=0x5) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80045400, &(0x7f0000000040)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r1) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000040)={r2, 0xb58a, 0x100000001, 0x2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)=0xc) openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x14d0c0, 0x142) pwritev(r4, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='devices.list\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r5, 0x0, 0x0, 0x87ffffc) 03:34:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {0xffffffffffffffff, 0x9520}, {r0}], 0x7, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:16 executing program 7: r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_MCAST_MSFILTER(r0, 0x0, 0x30, 0x0, 0x5002) 03:34:16 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:16 executing program 2: r0 = socket$unix(0x1, 0x1, 0x0) getsockopt$sock_buf(r0, 0x1, 0x1c, 0x0, &(0x7f0000000000)) 03:34:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x5, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000300)="f429ddc763860ace1fe93d585f675cbe4006dff70ad05cd49d0b3cb4b52853809fde52065d74d8ec7624530f3321d87b5b03bc29406a83bae2eac39306bfe315213b9b90b1df7d69766d7cf4062f0514dd93d0dad1ba903299f6ca7238c8c409bac1734e9647a99de22eb0", 0x6b, 0x6}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='sb=0x0000000000000009,noauto_da_alloc,errors=remount-ro,grpid,resgid=', @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077cae465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_unix(&(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), 0x2120010, &(0x7f0000000440)={'trans=unix,', {[{@cache_fscache}, {@version_u}, {@cachetag={'cachetag', 0x3d, 'vfat\x00'}}, {@access_client}, {@posixacl}, {@nodevmap}, {@access_any}], [{@subj_type={'subj_type', 0x3d, '\xff\xff'}}, {@subj_user={'subj_user', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) socket$inet6_udp(0xa, 0x2, 0x0) 03:34:16 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0xed4f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r0, &(0x7f0000000080)="01", 0x292e9) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000380), 0x0, 0x7fffff8, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="33c0f066bbcf4fe469397cef70c35ac05b27768622d52d13853e241fb59c551a9ec6f26754faa17ea376eeed7f9b97f0eb392b15fb4438e02a6dd64aa06208dcfd102d16569b0f8cdc0181a72e4eac8d38e5629df4b0a32f3cd16db0c5a498fd8a9c2939771e6c9848bd35", @ANYRES32=r1]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x203, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 03:34:16 executing program 2: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) 03:34:16 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {r0}], 0x6, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:16 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:16 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:16 executing program 2: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) 03:34:16 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {}], 0x6, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:16 executing program 3: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000240)=0x5) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80045400, &(0x7f0000000040)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r1) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000040)={r2, 0xb58a, 0x100000001, 0x2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)=0xc) openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x14d0c0, 0x142) pwritev(r4, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='devices.list\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r5, 0x0, 0x0, 0x87ffffc) 03:34:16 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) chdir(&(0x7f0000000140)='./file0\x00') syz_mount_image$ext4(&(0x7f0000000000)='ext2\x00', &(0x7f0000000040)='./file0\x00', 0x9, 0x5, &(0x7f0000000540)=[{&(0x7f00000000c0)="8016eedf362c803c1c565a3aad12f6745c4c93a3a39bd8b02a", 0x19, 0x3}, {&(0x7f0000000180)}, {&(0x7f0000000300)="f429ddc763860ace1fe93d585f675cbe4006dff70ad05cd49d0b3cb4b52853809fde52065d74d8ec7624530f3321d87b5b03bc29406a83bae2eac39306bfe315213b9b90b1df7d69766d7cf4062f0514dd93d0dad1ba903299f6ca7238c8c409bac1734e9647a99de22eb0", 0x6b, 0x6}, {&(0x7f0000000380)="be34a369b48b8a55d536c30958240d4c524db67820331990efc607070c1f2003e2d6e5a3c641b7744eebd1bf7906b8f026834574d252b0007d315b366925eb67089a80760f9a4157d8f849d8ff1baaf3ba00cd2ff6944279ce2e3d39e62ed25d642c3d4ecb56febca97f4da69c58e3a979886f9b04c382e3fc3791b1108c8acc74", 0x81, 0x48}, {&(0x7f0000000440)}], 0x0, &(0x7f0000000680)=ANY=[@ANYBLOB='sb=0x0000000000000009,noauto_da_alloc,errors=remount-ro,grpid,resgid=', @ANYRESHEX, @ANYBLOB="2c7573726a71756f74613d2e2f66696c65302c6772706964ac736d61636b66737472616e736d7574653d2d2c70e36dd661b70d1e5b3120f077cae465720569745f646972656374696f2c61707072616973655f747970653d696d617369672c00"]) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write$binfmt_aout(r0, &(0x7f0000001180)=ANY=[], 0x220) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x40000000, 0x5, @perf_config_ext={0x9, 0x2}, 0x980b, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) mount$9p_unix(&(0x7f0000000180)='./file2\x00', &(0x7f00000001c0)='./file1\x00', &(0x7f0000000240), 0x2120010, &(0x7f0000000440)={'trans=unix,', {[{@cache_fscache}, {@version_u}, {@cachetag={'cachetag', 0x3d, 'vfat\x00'}}, {@access_client}, {@posixacl}, {@nodevmap}, {@access_any}], [{@subj_type={'subj_type', 0x3d, '\xff\xff'}}, {@subj_user={'subj_user', 0x3d, '!'}}, {@euid_eq={'euid', 0x3d, 0xee01}}, {@euid_eq={'euid', 0x3d, 0xffffffffffffffff}}]}}) r2 = dup(r1) connect$inet6(r2, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast2, 0x2}, 0x1c) connect$inet6(r2, &(0x7f0000000200)={0xa, 0x4e22, 0x0, @ipv4={'\x00', '\xff\xff', @dev}}, 0x1c) sendmmsg$inet6(r2, &(0x7f0000002880), 0x4000101, 0x5a96) socket$inet6_udp(0xa, 0x2, 0x0) 03:34:16 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0xed4f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r0, &(0x7f0000000080)="01", 0x292e9) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000380), 0x0, 0x7fffff8, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="33c0f066bbcf4fe469397cef70c35ac05b27768622d52d13853e241fb59c551a9ec6f26754faa17ea376eeed7f9b97f0eb392b15fb4438e02a6dd64aa06208dcfd102d16569b0f8cdc0181a72e4eac8d38e5629df4b0a32f3cd16db0c5a498fd8a9c2939771e6c9848bd35", @ANYRES32=r1]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x203, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 03:34:17 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:17 executing program 2: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) 03:34:17 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:17 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:17 executing program 2: r0 = open$dir(&(0x7f0000000040)='.\x00', 0x0, 0x0) r1 = socket$inet6(0xa, 0x1, 0x0) pkey_mprotect(&(0x7f0000000000/0x3000)=nil, 0x3000, 0x4, 0xffffffffffffffff) copy_file_range(r0, 0x0, r1, 0x0, 0x0, 0x0) 03:34:17 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:17 executing program 3: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000240)=0x5) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80045400, &(0x7f0000000040)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r1) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000040)={r2, 0xb58a, 0x100000001, 0x2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)=0xc) openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x14d0c0, 0x142) pwritev(r4, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='devices.list\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r5, 0x0, 0x0, 0x87ffffc) 03:34:17 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {}], 0x6, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:17 executing program 3: ioctl$BLKBSZSET(0xffffffffffffffff, 0x40081271, &(0x7f0000000240)=0x5) r0 = openat$sndtimer(0xffffffffffffff9c, &(0x7f0000000000), 0x0) ioctl$SNDRV_TIMER_IOCTL_SELECT(r0, 0x80045400, &(0x7f0000000040)) r1 = io_uring_register$IORING_REGISTER_PERSONALITY(0xffffffffffffffff, 0x9, 0x0, 0x0) perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r3 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r3, &(0x7f0000000080)={0xa, 0x0, 0x0, @loopback}, 0x1c) io_uring_register$IORING_UNREGISTER_PERSONALITY(0xffffffffffffffff, 0xa, 0x0, r1) setsockopt$inet6_tcp_TCP_REPAIR(r3, 0x6, 0x13, &(0x7f0000000000), 0x4) ioctl$F2FS_IOC_MOVE_RANGE(r3, 0xc020f509, &(0x7f0000000040)={r2, 0xb58a, 0x100000001, 0x2}) r4 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x141042, 0x0) ioctl$EXT4_IOC_CHECKPOINT(r4, 0x4004662b, &(0x7f0000000340)=0xc) openat(0xffffffffffffffff, &(0x7f0000000180)='./file1\x00', 0x14d0c0, 0x142) pwritev(r4, &(0x7f0000000140)=[{&(0x7f0000000000)='P', 0x1}], 0x1, 0x0, 0x0) openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000200)='devices.list\x00', 0x0, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r5, 0x0, 0x0, 0x87ffffc) 03:34:17 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000100), 0x0, 0x0) ioctl$TCFLSH(r0, 0x540b, 0x0) 03:34:17 executing program 2: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) r1 = syz_io_uring_setup(0x46ac, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100), &(0x7f0000000200)) r2 = fcntl$dupfd(r0, 0x0, r1) setsockopt$inet6_udp_int(r2, 0x11, 0x65, &(0x7f0000000040), 0x4) 03:34:17 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0xed4f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r0, &(0x7f0000000080)="01", 0x292e9) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000380), 0x0, 0x7fffff8, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="33c0f066bbcf4fe469397cef70c35ac05b27768622d52d13853e241fb59c551a9ec6f26754faa17ea376eeed7f9b97f0eb392b15fb4438e02a6dd64aa06208dcfd102d16569b0f8cdc0181a72e4eac8d38e5629df4b0a32f3cd16db0c5a498fd8a9c2939771e6c9848bd35", @ANYRES32=r1]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x203, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 03:34:17 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) 03:34:17 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:17 executing program 6: prctl$PR_MCE_KILL(0x21, 0x0, 0x1) 03:34:17 executing program 6: syz_mount_image$vfat(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = inotify_init() inotify_add_watch(r0, &(0x7f0000000100)='./file0\x00', 0x500) close(r0) 03:34:17 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) 03:34:18 executing program 5: capset(&(0x7f0000000040)={0x19980330}, &(0x7f0000000580)) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) ioctl$FS_IOC_FSSETXATTR(r0, 0x40086602, &(0x7f0000000080)={0x200017e}) 03:34:18 executing program 2: r0 = openat$tcp_mem(0xffffffffffffff9c, &(0x7f0000000780)='/proc/sys/net/ipv4/tcp_rmem\x00', 0x1, 0x0) write$binfmt_script(r0, 0x0, 0x0) 03:34:18 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:18 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:18 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(0xffffffffffffffff, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {0x0}], 0x2, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, &(0x7f0000000080)) r1 = syz_io_uring_setup(0x137, &(0x7f00000001c0), &(0x7f0000ff9000/0x4000)=nil, &(0x7f0000ffe000/0x2000)=nil, &(0x7f0000000440), &(0x7f0000000380)) io_uring_enter(r1, 0x100001, 0x0, 0x0, 0x0, 0x0) copy_file_range(r0, &(0x7f0000000800)=0x7, r1, &(0x7f0000000840)=0x2, 0x5, 0x0) splice(r0, &(0x7f0000000000)=0x7, 0xffffffffffffffff, &(0x7f0000000040)=0xfff, 0x9, 0x7) setsockopt$inet_udp_encap(0xffffffffffffffff, 0x11, 0x64, 0x0, 0x0) fstat(r0, &(0x7f00000001c0)) bind$inet(r0, &(0x7f0000000180)={0x2, 0x4e20, @local}, 0x10) pwritev(r0, &(0x7f0000000380)=[{&(0x7f0000000140)='\x00', 0x1}], 0x1, 0x7fffff8, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0, 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) creat(&(0x7f0000000240)='./file1\x00', 0x119) 03:34:18 executing program 7: openat$dir(0xffffffffffffff9c, &(0x7f0000000000)='./file0\x00', 0x0, 0x0) perf_event_open(&(0x7f0000000180)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x1, 0x0, 0xed4f}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r0, &(0x7f0000000080)="01", 0x292e9) sendfile(0xffffffffffffffff, r0, 0x0, 0x0) openat$hpet(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) ioctl$FS_IOC_SETFLAGS(0xffffffffffffffff, 0x40086602, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r2, &(0x7f0000000380), 0x0, 0x7fffff8, 0x0) ioctl$AUTOFS_DEV_IOCTL_OPENMOUNT(0xffffffffffffffff, 0xc0189374, &(0x7f0000000300)=ANY=[@ANYBLOB="33c0f066bbcf4fe469397cef70c35ac05b27768622d52d13853e241fb59c551a9ec6f26754faa17ea376eeed7f9b97f0eb392b15fb4438e02a6dd64aa06208dcfd102d16569b0f8cdc0181a72e4eac8d38e5629df4b0a32f3cd16db0c5a498fd8a9c2939771e6c9848bd35", @ANYRES32=r1]) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7, 0x4, @perf_config_ext={0x203, 0x10001}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3800000000000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendfile(r1, r1, 0x0, 0x100000) 03:34:18 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {0xffffffffffffffff, 0x24}, {}], 0x6, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:18 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:18 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c80) 03:34:18 executing program 6: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$inet6_int(r0, 0x29, 0x4e, &(0x7f0000000000)=0x10001, 0x4) bind$inet6(r0, &(0x7f00000000c0)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @private}}, 0x1c) 03:34:18 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x9d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000040)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) readahead(r0, 0x0, 0x0) 03:34:18 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:18 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:18 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x0, 0x1, 0x7fff, 0xeaf, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/243, &(0x7f0000000340)=0xf3) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000800)={0x0, 0x8000, 0x3ff}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400), 0x2, 0x1) creat(&(0x7f00000003c0)='./file0/file0\x00', 0x15c) pwrite64(r0, 0x0, 0x0, 0x8) 03:34:18 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:18 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:19 executing program 6: perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r0, 0x0, 0x0, 0x87ffffc) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 03:34:19 executing program 5: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) truncate(&(0x7f0000000040)='./file1\x00', 0x8000) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = creat(&(0x7f0000000040)='./file0\x00', 0x0) fallocate(r2, 0x0, 0x0, 0xf06) ioctl$EXT4_IOC_MOVE_EXT(r0, 0xc028660f, &(0x7f0000000000)={0x0, r1, 0x0, 0x8000000000000}) 03:34:19 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x0, 0x1, 0x7fff, 0xeaf, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/243, &(0x7f0000000340)=0xf3) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000800)={0x0, 0x8000, 0x3ff}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400), 0x2, 0x1) creat(&(0x7f00000003c0)='./file0/file0\x00', 0x15c) pwrite64(r0, 0x0, 0x0, 0x8) 03:34:19 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(0xffffffffffffffff, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:19 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c80) 03:34:19 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:19 executing program 6: syz_mount_image$msdos(&(0x7f0000000000), 0x0, 0x0, 0x2, &(0x7f0000000180)=[{&(0x7f0000000080)='}', 0x1}, {&(0x7f00000000c0)="c108", 0x2, 0x7fffffff}], 0x0, &(0x7f00000001c0)) 03:34:19 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x0, 0x1, 0x7fff, 0xeaf, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/243, &(0x7f0000000340)=0xf3) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000800)={0x0, 0x8000, 0x3ff}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400), 0x2, 0x1) creat(&(0x7f00000003c0)='./file0/file0\x00', 0x15c) pwrite64(r0, 0x0, 0x0, 0x8) 03:34:19 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x0, 0x1, 0x7fff, 0xeaf, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/243, &(0x7f0000000340)=0xf3) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000800)={0x0, 0x8000, 0x3ff}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400), 0x2, 0x1) creat(&(0x7f00000003c0)='./file0/file0\x00', 0x15c) pwrite64(r0, 0x0, 0x0, 0x8) 03:34:19 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {r0}], 0x5, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:19 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:19 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {}], 0x5, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:19 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:19 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:19 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:19 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c80) 03:34:19 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x0, 0x1, 0x7fff, 0xeaf, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/243, &(0x7f0000000340)=0xf3) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000800)={0x0, 0x8000, 0x3ff}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400), 0x2, 0x1) creat(&(0x7f00000003c0)='./file0/file0\x00', 0x15c) pwrite64(r0, 0x0, 0x0, 0x8) 03:34:19 executing program 3: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x0, 0x1, 0x7fff, 0xeaf, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/243, &(0x7f0000000340)=0xf3) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000800)={0x0, 0x8000, 0x3ff}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400), 0x2, 0x1) creat(&(0x7f00000003c0)='./file0/file0\x00', 0x15c) pwrite64(r0, 0x0, 0x0, 0x8) 03:34:20 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:20 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:20 executing program 5: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x4, 0x0, @perf_config_ext, 0x2002, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = socket$inet6_udp(0xa, 0x2, 0x0) dup(r1) fcntl$lock(r1, 0x6, &(0x7f0000000180)={0x0, 0x1, 0x7fff, 0xeaf, 0xffffffffffffffff}) r2 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$IP_VS_SO_GET_SERVICES(r2, 0x0, 0x482, &(0x7f0000000440)=""/243, &(0x7f0000000340)=0xf3) syz_mount_image$ext4(0x0, &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000180)='./file0\x00', &(0x7f00000001c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r3, 0x0) r4 = openat$selinux_attr(0xffffffffffffff9c, &(0x7f0000000300)='/proc/thread-self/attr/exec\x00', 0x2, 0x0) ioctl$BTRFS_IOC_SCRUB(r4, 0xc400941b, &(0x7f0000000800)={0x0, 0x8000, 0x3ff}) move_mount(0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0, 0x0) syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) lstat(&(0x7f0000000040)='./file0\x00', &(0x7f0000000080)) setxattr$trusted_overlay_opaque(&(0x7f0000000000)='./file0\x00', &(0x7f0000000140), &(0x7f0000000400), 0x2, 0x1) creat(&(0x7f00000003c0)='./file0/file0\x00', 0x15c) pwrite64(r0, 0x0, 0x0, 0x8) 03:34:20 executing program 7: r0 = openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$LOOP_CTL_REMOVE(r0, 0x4c81, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f0000000080)) ioctl$LOOP_CTL_GET_FREE(r0, 0x4c80) 03:34:20 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:20 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:20 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:20 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:20 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {}], 0x5, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:20 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, 0x0, 0x0) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:21 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:21 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:21 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:21 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:21 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:21 executing program 7: r0 = openat$tun(0xffffffffffffff9c, &(0x7f0000000280), 0x0, 0x0) socket$packet(0x11, 0x0, 0x300) clone3(&(0x7f0000004c00)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) ioctl$TUNGETFEATURES(r0, 0x800454cf, &(0x7f0000000000)) 03:34:21 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:21 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) r3 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r3, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:21 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:21 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:21 executing program 6: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file0\x00', &(0x7f0000000040)='./file0\x00', 0x0, 0x163008, 0x0) syz_mount_image$ext4(&(0x7f0000000080)='ext3\x00', &(0x7f0000000340)='./file0\x00', 0x0, 0x0, 0x0, 0x10000aa, &(0x7f0000000140)={[{@data_ordered}]}) 03:34:21 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {0xffffffffffffffff, 0x2044}, {}], 0x5, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:22 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(0xffffffffffffffff, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) tkill(0x0, 0x0) open(0x0, 0x0, 0x5e) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 03:34:22 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) [ 1849.310002] EXT4-fs (sda): re-mounted 7b5d9a40-9011-49ec-8035-27953f97a4d8. Quota mode: writeback. 03:34:22 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0x0, 0x6}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = gettid() getpriority(0x1, r1) perf_event_open(&(0x7f0000000000)={0x5, 0x80, 0x6, 0x20, 0x40, 0x80, 0x0, 0x6, 0x20000, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, @perf_config_ext={0xc12000000}, 0x20, 0xffff, 0x7, 0x4, 0x10000, 0x0, 0x0, 0x0, 0x86b, 0x0, 0x1}, r1, 0x6, r0, 0x2) r2 = socket$inet6_udp(0xa, 0x2, 0x0) r3 = dup(r2) connect$inet6(r3, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r3, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r3, &(0x7f0000002880), 0x4000101, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) 03:34:22 executing program 7: r0 = socket$nl_xfrm(0x10, 0x3, 0x6) sendmsg$nl_xfrm(r0, &(0x7f00000005c0)={0x0, 0x0, &(0x7f0000000580)={&(0x7f0000000300)=@delsa={0x28, 0x11, 0x1, 0x0, 0x0, {@in=@initdev={0xac, 0x1e, 0x0, 0x0}, 0x0, 0x0, 0x33}}, 0x28}}, 0x0) 03:34:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) tkill(0x0, 0x0) open(0x0, 0x0, 0x5e) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 03:34:22 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r1, 0x0) write(r3, &(0x7f0000000340)="d0", 0x1) close(r0) 03:34:22 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:22 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_PATH_EMPTY(r0, 0x4, &(0x7f0000000040)='ramfs\x00', &(0x7f0000000080)='./file0\x00', 0xffffffffffffff9c) 03:34:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) tkill(0x0, 0x0) open(0x0, 0x0, 0x5e) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 03:34:22 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000100)={0x0, 0x0, &(0x7f00000000c0)={&(0x7f0000000600)={0x38, r1, 0x17, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_TX_RATES={0x1c, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xa, 0x1, 0x0, 0x1, [@NL80211_TXRATE_VHT={0x14}]}]}]}, 0x38}}, 0x0) 03:34:22 executing program 1: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) r2 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r2, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:22 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:22 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {r0}], 0x4, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r1, 0x0) write(r3, &(0x7f0000000340)="d0", 0x1) close(r0) 03:34:22 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) [ 1850.049494] netlink: 6 bytes leftover after parsing attributes in process `syz-executor.5'. 03:34:22 executing program 1: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r1, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:22 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r1, 0x0) write(r3, &(0x7f0000000340)="d0", 0x1) close(r0) 03:34:22 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {}], 0x4, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:22 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) creat(0x0, 0x0) tkill(0x0, 0x0) open(0x0, 0x0, 0x5e) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000080), 0x0, 0x0) fsetxattr$trusted_overlay_upper(r0, &(0x7f0000000000), 0x0, 0x0, 0x0) 03:34:22 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, 0x0, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:23 executing program 7: syz_emit_ethernet(0x8b, &(0x7f0000000000)={@multicast, @local, @void, {@ipv6={0x86dd, @udp={0x0, 0x6, '#\x00\b', 0x55, 0x2c, 0x0, @local, @local, {[@routing={0x88}], {0x0, 0x0, 0x7, 0x0, @opaque="bd4c908e01433afa20804a2b340fe4e5cd7642eb2d27348ad808ec06894b4ed2afe8397426f0f14f6f85c5dad0f91a6982d532fc743ee341184631719122187ed5e08cf13a"}}}}}}, 0x0) 03:34:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) 03:34:23 executing program 1: getpid() openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:23 executing program 6: openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0xc042, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000040)='./file1\x00', 0x0, 0x0) r0 = perf_event_open(&(0x7f0000000280)={0x7, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040)}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) write$binfmt_script(r2, &(0x7f0000000300)=ANY=[], 0xb) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x42, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r1, 0x0) write(r3, &(0x7f0000000340)="d0", 0x1) close(r0) 03:34:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x21c}]}, 0x24}}, 0x0) [ 1850.300033] ------------[ cut here ]------------ [ 1850.300797] wlan0: Failed check-sdata-in-driver check, flags: 0x0 [ 1850.301820] WARNING: CPU: 1 PID: 480588 at net/mac80211/main.c:288 ieee80211_link_info_change_notify+0x1fd/0x270 [ 1850.302617] Modules linked in: [ 1850.302857] CPU: 1 PID: 480588 Comm: syz-executor.5 Not tainted 6.4.0-rc1-next-20230511 #1 [ 1850.303473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS 1.12.0-1 04/01/2014 [ 1850.304054] RIP: 0010:ieee80211_link_info_change_notify+0x1fd/0x270 [ 1850.304550] Code: 8b 9d 88 06 00 00 48 85 db 74 32 e8 8d 28 34 fd 48 89 dd e8 85 28 34 fd 44 89 f2 48 89 ee 48 c7 c7 e0 56 df 84 e8 33 58 ff fc <0f> 0b e9 76 ff ff ff e8 67 28 34 fd 0f 0b e9 43 fe ff ff e8 5b 28 [ 1850.305817] RSP: 0018:ffff888032a4f490 EFLAGS: 00010282 [ 1850.306199] RAX: 0000000000000000 RBX: ffff888017f18000 RCX: ffffc90007f16000 [ 1850.306722] RDX: 0000000000040000 RSI: ffffffff81171cd2 RDI: 0000000000000001 [ 1850.307228] RBP: ffff888017f18000 R08: 0000000000000001 R09: 0000000000000000 [ 1850.307751] R10: 0000000000000001 R11: 0000000000000001 R12: 0000000000000000 [ 1850.308252] R13: ffff888017f1a068 R14: 0000000000000000 R15: ffff888036d706c0 [ 1850.308770] FS: 00007fe2d89bc700(0000) GS:ffff88806cf00000(0000) knlGS:0000000000000000 [ 1850.309332] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 1850.309811] CR2: 0000001b2f722000 CR3: 0000000020138000 CR4: 0000000000350ee0 [ 1850.310343] DR0: 0000000000000000 DR1: 0000000000000000 DR2: 0000000000000000 [ 1850.310906] DR3: 0000000000000000 DR6: 00000000ffff0ff0 DR7: 0000000000000600 [ 1850.311456] Call Trace: [ 1850.311657] [ 1850.311837] ? nl80211_parse_mcast_rate+0x17e/0x1e0 [ 1850.314198] ieee80211_set_mcast_rate+0x42/0x50 [ 1850.315796] ? __pfx_ieee80211_set_mcast_rate+0x10/0x10 [ 1850.316803] nl80211_set_mcast_rate+0x30a/0x680 [ 1850.317175] ? __pfx_nl80211_set_mcast_rate+0x10/0x10 [ 1850.317604] ? nl80211_pre_doit+0x111/0x980 [ 1850.317953] genl_family_rcv_msg_doit.isra.0+0x1ee/0x2e0 [ 1850.318361] ? __pfx_genl_family_rcv_msg_doit.isra.0+0x10/0x10 [ 1850.318834] ? cap_capable+0x1be/0x220 [ 1850.319158] ? ns_capable+0xe4/0x120 [ 1850.319475] genl_rcv_msg+0x503/0x7e0 [ 1850.319774] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1850.320100] ? __pfx_nl80211_pre_doit+0x10/0x10 [ 1850.320482] ? __pfx_nl80211_set_mcast_rate+0x10/0x10 [ 1850.320890] ? __pfx_nl80211_post_doit+0x10/0x10 [ 1850.321259] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 1850.321695] ? __create_object+0x3ee/0xc90 [ 1850.322034] netlink_rcv_skb+0x15d/0x450 [ 1850.322351] ? __pfx_genl_rcv_msg+0x10/0x10 [ 1850.322831] ? __pfx_netlink_rcv_skb+0x10/0x10 [ 1850.323318] ? lock_acquire+0x19a/0x4c0 [ 1850.323778] genl_rcv+0x28/0x40 [ 1850.324142] netlink_unicast+0x552/0x800 [ 1850.324612] ? __pfx_netlink_unicast+0x10/0x10 [ 1850.325091] ? __virt_addr_valid+0x102/0x340 [ 1850.325576] netlink_sendmsg+0x923/0xe40 [ 1850.326038] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1850.326550] ? __pfx_netlink_sendmsg+0x10/0x10 [ 1850.327026] sock_sendmsg+0x1b6/0x200 [ 1850.327458] ____sys_sendmsg+0x74e/0x980 [ 1850.327889] ? copy_msghdr_from_user+0xfc/0x150 [ 1850.328370] ? __pfx_____sys_sendmsg+0x10/0x10 [ 1850.328886] ? __pfx_perf_trace_lock_acquire+0x10/0x10 [ 1850.329434] ? lock_release+0x1e3/0x680 [ 1850.329878] ___sys_sendmsg+0x110/0x1b0 [ 1850.330308] ? __pfx____sys_sendmsg+0x10/0x10 [ 1850.330751] ? __fget_files+0x24e/0x480 [ 1850.331068] ? __pfx_lock_release+0x10/0x10 [ 1850.331416] ? __pfx___perf_event_task_sched_in+0x10/0x10 [ 1850.331840] ? lock_release+0x1e3/0x680 [ 1850.332147] ? xfd_validate_state+0x51/0x170 [ 1850.332524] ? __fget_files+0x270/0x480 [ 1850.332843] ? __fget_light+0xe5/0x280 [ 1850.333155] __sys_sendmsg+0xf7/0x1d0 [ 1850.333471] ? __pfx___sys_sendmsg+0x10/0x10 [ 1850.333844] ? lockdep_hardirqs_on_prepare+0x27b/0x3f0 [ 1850.334242] ? syscall_enter_from_user_mode+0x21/0x50 [ 1850.334670] do_syscall_64+0x3f/0x90 [ 1850.334960] entry_SYSCALL_64_after_hwframe+0x72/0xdc [ 1850.335354] RIP: 0033:0x7fe2db446b19 [ 1850.335659] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 1850.336995] RSP: 002b:00007fe2d89bc188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 1850.337569] RAX: ffffffffffffffda RBX: 00007fe2db559f60 RCX: 00007fe2db446b19 [ 1850.338125] RDX: 0000000000000000 RSI: 0000000020000400 RDI: 0000000000000003 [ 1850.338661] RBP: 00007fe2db4a0f6d R08: 0000000000000000 R09: 0000000000000000 [ 1850.339194] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000000 [ 1850.339737] R13: 00007ffd956a93df R14: 00007fe2d89bc300 R15: 0000000000022000 [ 1850.340270] [ 1850.340467] irq event stamp: 1661 [ 1850.340724] hardirqs last enabled at (1671): [] __up_console_sem+0x78/0x80 [ 1850.341346] hardirqs last disabled at (1680): [] __up_console_sem+0x5d/0x80 [ 1850.342019] softirqs last enabled at (794): [] __irq_exit_rcu+0xcc/0x110 [ 1850.342662] softirqs last disabled at (735): [] __irq_exit_rcu+0xcc/0x110 [ 1850.343279] ---[ end trace 0000000000000000 ]--- 03:34:23 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) 03:34:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x21c}]}, 0x24}}, 0x0) 03:34:23 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:23 executing program 1: getpid() r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:23 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fgetxattr(r0, &(0x7f0000001200)=@known='system.sockprotoname\x00', &(0x7f0000001280)=""/102400, 0x19000) 03:34:23 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {}], 0x4, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:23 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, 0x0) 03:34:23 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x21c}]}, 0x24}}, 0x0) 03:34:23 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, 0x0) 03:34:24 executing program 2: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r0, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) r3 = socket$nl_generic(0x10, 0x3, 0x10) r4 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000040), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r3, 0x8933, &(0x7f0000000100)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_REGISTER_FRAME(r3, &(0x7f00000002c0)={0x0, 0x0, &(0x7f0000000280)={&(0x7f0000000500)={0x28, r4, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r5}, @void}}, [@NL80211_ATTR_FRAME_MATCH={0x4}, @NL80211_ATTR_FRAME_TYPE={0x6, 0x65, 0x40}]}, 0x28}}, 0x0) 03:34:24 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:24 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fgetxattr(r0, &(0x7f0000001200)=@known='system.sockprotoname\x00', &(0x7f0000001280)=""/102400, 0x19000) 03:34:24 executing program 5: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000440), 0xffffffffffffffff) ioctl$sock_SIOCGIFINDEX_80211(r0, 0x8933, &(0x7f0000000080)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_MCAST_RATE(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000340)={0x24, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r2}, @void}}, [@NL80211_ATTR_MCAST_RATE={0x8, 0x6b, 0x21c}]}, 0x24}}, 0x0) 03:34:24 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, 0x0) 03:34:24 executing program 4: getpid() r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r0, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r0, &(0x7f00000000c0), 0x12) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(r1, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r0, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:24 executing program 1: r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fgetxattr(r0, &(0x7f0000001200)=@known='system.sockprotoname\x00', &(0x7f0000001280)=""/102400, 0x19000) 03:34:24 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {0xffffffffffffffff, 0x7000}, {}], 0x4, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:24 executing program 7: r0 = openat$cdrom(0xffffffffffffff9c, &(0x7f0000000080), 0x840, 0x0) ioctl$CDROM_SEND_PACKET(r0, 0x2275, 0x0) 03:34:24 executing program 1: r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:24 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:24 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) fgetxattr(r0, &(0x7f0000001200)=@known='system.sockprotoname\x00', &(0x7f0000001280)=""/102400, 0x19000) 03:34:24 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:24 executing program 1: r0 = syz_open_procfs(0x0, 0x0) read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:25 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:25 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {r0}], 0x3, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:25 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:25 executing program 1: syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(0xffffffffffffffff, &(0x7f0000000040)=""/169, 0x200000e9) 03:34:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, 0x0, 0x0) 03:34:25 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {}], 0x3, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:25 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty20(0xc, 0x4, 0x0) r1 = syz_open_dev$tty20(0xc, 0x4, 0x0) r2 = dup(r1) ioctl$TCSETAF(r2, 0x5408, &(0x7f0000000100)={0x0, 0x0, 0x0, 0x0, 0x0, "a0bcc8f0643c1a35"}) write(r0, &(0x7f0000000180)='0', 0x1) 03:34:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, 0x0, 0x0) 03:34:25 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$nl_netfilter(r0, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000080)={&(0x7f0000000280)=ANY=[@ANYBLOB="1800000003010102000000000000000000000000040019"], 0x18}}, 0x0) 03:34:25 executing program 2: clone3(&(0x7f00000003c0)={0x30000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), {0x17}, 0x0, 0x0, &(0x7f00000002c0)=""/209, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="3d723d21de61", 0x6, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x3f, 0xff, 0x270, 0x34, 0x0, 0x21f, 0xb3}, "0544d3ae16a17b2670bc3703ae7c4805e0fe5bdac5424c76f087f9c5bfaee22b79f29207868a93b2d31edae2e3870bb0d9876f400867ae5ffac08f83a434aa3bc7a41ab11ce1b02c35d2f37db85227cedaadb41baeea6bab947e5be923fdf40682a57c57ad9ccb6a9a38259179503762d65e4ccaa069ac2d91ef0ad3698c9cd72bcf005ddf94c85fc6ffc7ad8a9eb5a6d4dcd98a610bf9991f07210c4abe33d7ea1f922921dd6987e857ebef305d278029412e3d738841918f299492a5c8c38e2e0b6d60eb34d39c017b5e7966ad8b928e0079923130bf199dee3fef8390189ac2fba0c89eed36f619af685c"}, 0x10c) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:34:25 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) recvmmsg$unix(0xffffffffffffffff, 0x0, 0x0, 0x40002121, 0x0) r0 = socket$inet6_udp(0xa, 0x2, 0x0) r1 = dup(r0) connect$inet6(r1, &(0x7f00000000c0)={0xa, 0x0, 0x0, @mcast1, 0x5}, 0x1c) connect$inet6(r1, &(0x7f0000000200)={0xa, 0x4e23, 0x0, @ipv4={'\x00', '\xff\xff', @multicast2}}, 0x1c) sendmmsg$inet6(r1, &(0x7f0000002880), 0x4000101, 0x0) 03:34:25 executing program 6: perf_event_open(&(0x7f0000000100)={0x2, 0x80, 0xcb, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_TCP_REPAIR_QUEUE(r0, 0x6, 0x14, &(0x7f0000000000), 0x4) 03:34:25 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r0 = socket$nl_netfilter(0x10, 0x3, 0xc) sendmsg$NFULNL_MSG_CONFIG(r0, &(0x7f0000001600)={0x0, 0x0, &(0x7f00000015c0)={&(0x7f0000001540)={0x28, 0x1, 0x4, 0x101, 0x0, 0x0, {}, [@NFULA_CFG_MODE={0xa, 0x2, {0x0, 0x2}}, @NFULA_CFG_CMD={0x5, 0x1, 0x1}]}, 0x28}}, 0x0) getpriority(0x1, 0x0) r1 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000000), 0x2001, 0x0) write$rfkill(r1, 0x0, 0x72) fcntl$setown(r0, 0x8, 0x0) 03:34:25 executing program 1: r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, 0x0, 0x0) 03:34:25 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:26 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000340), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000300)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TX_BITRATE_MASK(r0, &(0x7f0000000180)={0x0, 0x0, &(0x7f0000000040)={&(0x7f0000000340)={0x2c, r1, 0x401, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TX_RATES={0x10, 0x5a, 0x0, 0x1, [@NL80211_BAND_5GHZ={0xc, 0x1, 0x0, 0x1, [@NL80211_TXRATE_GI={0x5}]}]}]}, 0x2c}}, 0x0) 03:34:26 executing program 5: socket$packet(0x11, 0x2, 0x300) 03:34:26 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 03:34:26 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {}], 0x3, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:26 executing program 2: clone3(&(0x7f00000003c0)={0x30000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), {0x17}, 0x0, 0x0, &(0x7f00000002c0)=""/209, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="3d723d21de61", 0x6, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x3f, 0xff, 0x270, 0x34, 0x0, 0x21f, 0xb3}, "0544d3ae16a17b2670bc3703ae7c4805e0fe5bdac5424c76f087f9c5bfaee22b79f29207868a93b2d31edae2e3870bb0d9876f400867ae5ffac08f83a434aa3bc7a41ab11ce1b02c35d2f37db85227cedaadb41baeea6bab947e5be923fdf40682a57c57ad9ccb6a9a38259179503762d65e4ccaa069ac2d91ef0ad3698c9cd72bcf005ddf94c85fc6ffc7ad8a9eb5a6d4dcd98a610bf9991f07210c4abe33d7ea1f922921dd6987e857ebef305d278029412e3d738841918f299492a5c8c38e2e0b6d60eb34d39c017b5e7966ad8b928e0079923130bf199dee3fef8390189ac2fba0c89eed36f619af685c"}, 0x10c) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:34:26 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:26 executing program 7: clone3(&(0x7f00000003c0)={0x30000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), {0x17}, 0x0, 0x0, &(0x7f00000002c0)=""/209, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="3d723d21de61", 0x6, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x3f, 0xff, 0x270, 0x34, 0x0, 0x21f, 0xb3}, "0544d3ae16a17b2670bc3703ae7c4805e0fe5bdac5424c76f087f9c5bfaee22b79f29207868a93b2d31edae2e3870bb0d9876f400867ae5ffac08f83a434aa3bc7a41ab11ce1b02c35d2f37db85227cedaadb41baeea6bab947e5be923fdf40682a57c57ad9ccb6a9a38259179503762d65e4ccaa069ac2d91ef0ad3698c9cd72bcf005ddf94c85fc6ffc7ad8a9eb5a6d4dcd98a610bf9991f07210c4abe33d7ea1f922921dd6987e857ebef305d278029412e3d738841918f299492a5c8c38e2e0b6d60eb34d39c017b5e7966ad8b928e0079923130bf199dee3fef8390189ac2fba0c89eed36f619af685c"}, 0x10c) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:34:26 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 03:34:26 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000080), &(0x7f0000000100)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="04000000646f7366d8a02b00080101000440002000f801", 0x17}, {0x0, 0x0, 0x2840}], 0x0, &(0x7f0000000140)=ANY=[]) ioctl$FAT_IOCTL_SET_ATTRIBUTES(r0, 0x82307202, 0x0) 03:34:26 executing program 5: rseq(&(0x7f0000000040), 0x20, 0x0, 0x0) ppoll(0x0, 0x0, &(0x7f0000000380)={0x0, 0x3938700}, 0x0, 0x0) 03:34:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x5}) 03:34:26 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) getpid() r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsmount(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r2, 0x0) clone3(&(0x7f0000000600)={0x3000080, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), {0x1b}, &(0x7f0000000300)=""/117, 0x75, &(0x7f00000003c0)=""/184, &(0x7f00000005c0), 0x0, {r2}}, 0x58) ioctl$SNAPSHOT_FREE(r0, 0x3305) 03:34:26 executing program 5: r0 = socket$inet6_tcp(0xa, 0x1, 0x0) setsockopt$sock_int(r0, 0x1, 0x21, &(0x7f0000000040), 0x4) setsockopt$inet6_tcp_TCP_REPAIR(r0, 0x6, 0x13, &(0x7f00000018c0)=0x1, 0x4) connect$inet6(r0, &(0x7f0000000080)={0xa, 0x0, 0x0, @ipv4={'\x00', '\xff\xff', @remote}}, 0x1c) 03:34:26 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) [ 1854.157127] random: crng reseeded on system resumption 03:34:26 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x5}) 03:34:27 executing program 7: clone3(&(0x7f00000003c0)={0x30000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), {0x17}, 0x0, 0x0, &(0x7f00000002c0)=""/209, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="3d723d21de61", 0x6, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x3f, 0xff, 0x270, 0x34, 0x0, 0x21f, 0xb3}, "0544d3ae16a17b2670bc3703ae7c4805e0fe5bdac5424c76f087f9c5bfaee22b79f29207868a93b2d31edae2e3870bb0d9876f400867ae5ffac08f83a434aa3bc7a41ab11ce1b02c35d2f37db85227cedaadb41baeea6bab947e5be923fdf40682a57c57ad9ccb6a9a38259179503762d65e4ccaa069ac2d91ef0ad3698c9cd72bcf005ddf94c85fc6ffc7ad8a9eb5a6d4dcd98a610bf9991f07210c4abe33d7ea1f922921dd6987e857ebef305d278029412e3d738841918f299492a5c8c38e2e0b6d60eb34d39c017b5e7966ad8b928e0079923130bf199dee3fef8390189ac2fba0c89eed36f619af685c"}, 0x10c) socket$inet_icmp_raw(0x2, 0x3, 0x1) [ 1854.204949] Restarting kernel threads ... done. [ 1854.241061] random: crng reseeded on system resumption 03:34:27 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x0, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:27 executing program 2: clone3(&(0x7f00000003c0)={0x30000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), {0x17}, 0x0, 0x0, &(0x7f00000002c0)=""/209, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="3d723d21de61", 0x6, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x3f, 0xff, 0x270, 0x34, 0x0, 0x21f, 0xb3}, "0544d3ae16a17b2670bc3703ae7c4805e0fe5bdac5424c76f087f9c5bfaee22b79f29207868a93b2d31edae2e3870bb0d9876f400867ae5ffac08f83a434aa3bc7a41ab11ce1b02c35d2f37db85227cedaadb41baeea6bab947e5be923fdf40682a57c57ad9ccb6a9a38259179503762d65e4ccaa069ac2d91ef0ad3698c9cd72bcf005ddf94c85fc6ffc7ad8a9eb5a6d4dcd98a610bf9991f07210c4abe33d7ea1f922921dd6987e857ebef305d278029412e3d738841918f299492a5c8c38e2e0b6d60eb34d39c017b5e7966ad8b928e0079923130bf199dee3fef8390189ac2fba0c89eed36f619af685c"}, 0x10c) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:34:27 executing program 5: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) chroot(&(0x7f0000000000)='./file1\x00') open(&(0x7f00000001c0)='./file1/../file0\x00', 0x42, 0x0) 03:34:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x5}) 03:34:27 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:27 executing program 2: clone3(&(0x7f00000003c0)={0x30000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), {0x17}, 0x0, 0x0, &(0x7f00000002c0)=""/209, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="3d723d21de61", 0x6, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x3f, 0xff, 0x270, 0x34, 0x0, 0x21f, 0xb3}, "0544d3ae16a17b2670bc3703ae7c4805e0fe5bdac5424c76f087f9c5bfaee22b79f29207868a93b2d31edae2e3870bb0d9876f400867ae5ffac08f83a434aa3bc7a41ab11ce1b02c35d2f37db85227cedaadb41baeea6bab947e5be923fdf40682a57c57ad9ccb6a9a38259179503762d65e4ccaa069ac2d91ef0ad3698c9cd72bcf005ddf94c85fc6ffc7ad8a9eb5a6d4dcd98a610bf9991f07210c4abe33d7ea1f922921dd6987e857ebef305d278029412e3d738841918f299492a5c8c38e2e0b6d60eb34d39c017b5e7966ad8b928e0079923130bf199dee3fef8390189ac2fba0c89eed36f619af685c"}, 0x10c) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:34:27 executing program 7: clone3(&(0x7f00000003c0)={0x30000000, &(0x7f0000000000), 0x0, &(0x7f00000000c0), {0x17}, 0x0, 0x0, &(0x7f00000002c0)=""/209, 0x0}, 0x58) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x0, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = socket$packet(0x11, 0x2, 0x300) r1 = socket$nl_audit(0x10, 0x3, 0x9) ioctl$sock_SIOCGIFINDEX(r1, 0x8933, &(0x7f0000000040)={'wlan1\x00', 0x0}) sendto$packet(r0, &(0x7f0000000000)="3d723d21de61", 0x6, 0x0, &(0x7f0000000100)={0x11, 0x0, r2, 0x1, 0x0, 0x6, @link_local}, 0x14) write$binfmt_aout(r0, &(0x7f00000001c0)={{0x107, 0x3f, 0xff, 0x270, 0x34, 0x0, 0x21f, 0xb3}, "0544d3ae16a17b2670bc3703ae7c4805e0fe5bdac5424c76f087f9c5bfaee22b79f29207868a93b2d31edae2e3870bb0d9876f400867ae5ffac08f83a434aa3bc7a41ab11ce1b02c35d2f37db85227cedaadb41baeea6bab947e5be923fdf40682a57c57ad9ccb6a9a38259179503762d65e4ccaa069ac2d91ef0ad3698c9cd72bcf005ddf94c85fc6ffc7ad8a9eb5a6d4dcd98a610bf9991f07210c4abe33d7ea1f922921dd6987e857ebef305d278029412e3d738841918f299492a5c8c38e2e0b6d60eb34d39c017b5e7966ad8b928e0079923130bf199dee3fef8390189ac2fba0c89eed36f619af685c"}, 0x10c) socket$inet_icmp_raw(0x2, 0x3, 0x1) 03:34:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) getpid() r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsmount(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r2, 0x0) clone3(&(0x7f0000000600)={0x3000080, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), {0x1b}, &(0x7f0000000300)=""/117, 0x75, &(0x7f00000003c0)=""/184, &(0x7f00000005c0), 0x0, {r2}}, 0x58) ioctl$SNAPSHOT_FREE(r0, 0x3305) 03:34:27 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 03:34:27 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {0xffffffffffffffff, 0x60c0}, {}], 0x3, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) getpid() r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsmount(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r2, 0x0) clone3(&(0x7f0000000600)={0x3000080, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), {0x1b}, &(0x7f0000000300)=""/117, 0x75, &(0x7f00000003c0)=""/184, &(0x7f00000005c0), 0x0, {r2}}, 0x58) ioctl$SNAPSHOT_FREE(r0, 0x3305) [ 1854.940072] random: crng reseeded on system resumption 03:34:27 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:27 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) ioctl$TIOCGSID(0xffffffffffffffff, 0x5429, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = gettid() r1 = getpid() rt_tgsigqueueinfo(r1, r0, 0x11, &(0x7f00000001c0)={0x0, 0x0, 0x5}) 03:34:27 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) getpid() r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsmount(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r2, 0x0) clone3(&(0x7f0000000600)={0x3000080, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), {0x1b}, &(0x7f0000000300)=""/117, 0x75, &(0x7f00000003c0)=""/184, &(0x7f00000005c0), 0x0, {r2}}, 0x58) ioctl$SNAPSHOT_FREE(r0, 0x3305) [ 1855.044183] Restarting kernel threads ... done. 03:34:27 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) getpid() r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsmount(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r2, 0x0) clone3(&(0x7f0000000600)={0x3000080, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), {0x1b}, &(0x7f0000000300)=""/117, 0x75, &(0x7f00000003c0)=""/184, &(0x7f00000005c0), 0x0, {r2}}, 0x58) ioctl$SNAPSHOT_FREE(r0, 0x3305) 03:34:28 executing program 2: ioctl$sock_SIOCGIFCONF(0xffffffffffffffff, 0x8912, &(0x7f0000000000)=@buf) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$unix(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) vmsplice(0xffffffffffffffff, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file0\x00', 0x105443, 0x0) ioctl$FITRIM(r0, 0xc0185879, &(0x7f0000000180)={0x0, 0xffffffffffffffff}) 03:34:28 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x2, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:28 executing program 7: socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000180)={0xffffffffffffffff}) gettid() sendmsg$unix(r0, &(0x7f0000000940)={0x0, 0x0, &(0x7f0000000780)=[{&(0x7f0000000480)="f8", 0x1}], 0x1, &(0x7f00000008c0)=[@rights={{0x14, 0x1, 0x1, [r0]}}], 0x18}, 0x841) 03:34:28 executing program 1: syz_mount_image$vfat(0x0, 0x0, 0x0, 0x0, &(0x7f0000000180), 0x0, 0x0) r0 = socket$nl_generic(0x10, 0x3, 0x10) sendmsg$NL80211_CMD_GET_WOWLAN(r0, &(0x7f0000000bc0)={0x0, 0x0, &(0x7f0000000b80)={&(0x7f0000000b40)={0x30, 0x0, 0x0, 0x0, 0x0, {{}, {@val={0x8}, @val={0x8}, @val={0xc}}}}, 0x30}}, 0x0) sendmsg$ETHTOOL_MSG_DEBUG_GET(r0, &(0x7f0000001380)={&(0x7f0000000c00)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000001340)={&(0x7f0000001140)={0x14}, 0x14}}, 0x0) 03:34:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) getpid() r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsmount(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r2, 0x0) clone3(&(0x7f0000000600)={0x3000080, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), {0x1b}, &(0x7f0000000300)=""/117, 0x75, &(0x7f00000003c0)=""/184, &(0x7f00000005c0), 0x0, {r2}}, 0x58) ioctl$SNAPSHOT_FREE(r0, 0x3305) [ 1855.283291] random: crng reseeded on system resumption [ 1855.359115] Restarting kernel threads ... done. 03:34:28 executing program 1: r0 = socket$packet(0x11, 0x3, 0x300) setsockopt$packet_int(r0, 0x107, 0x11, &(0x7f0000000040), 0x4) 03:34:28 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = openat$snapshot(0xffffffffffffff9c, &(0x7f0000000380), 0x181481, 0x0) getpid() r1 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsmount(r1, 0x0, 0x0) r2 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) mmap(&(0x7f0000001000/0x3000)=nil, 0x3000, 0x0, 0x401a012, r2, 0x0) clone3(&(0x7f0000000600)={0x3000080, &(0x7f0000000040), &(0x7f00000001c0), &(0x7f0000000240), {0x1b}, &(0x7f0000000300)=""/117, 0x75, &(0x7f00000003c0)=""/184, &(0x7f00000005c0), 0x0, {r2}}, 0x58) ioctl$SNAPSHOT_FREE(r0, 0x3305) 03:34:28 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:28 executing program 7: syz_io_uring_setup(0x1735, &(0x7f0000000340), &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffa000/0x3000)=nil, &(0x7f00000003c0), &(0x7f0000000400)=0x0) r1 = syz_io_uring_setup(0x178f, &(0x7f0000000080)={0x0, 0x0, 0x900}, &(0x7f00000a0000)=nil, &(0x7f0000ffb000/0x3000)=nil, &(0x7f0000000000)=0x0, &(0x7f0000000040)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000100)=@IORING_OP_READV=@use_registered_buffer={0x1, 0x7, 0x0, @fd_index}, 0x0) syz_io_uring_submit(r2, r0, &(0x7f0000000000)=@IORING_OP_POLL_ADD, 0x0) io_uring_enter(r1, 0x5a81, 0x0, 0x0, 0x0, 0x0) 03:34:28 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) prctl$PR_SET_MM_MAP(0x19, 0xe, 0x0, 0x0) 03:34:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) syz_init_net_socket$bt_sco(0x1f, 0x5, 0x2) syz_mount_image$ext4(0x0, &(0x7f0000000380)='./file0\x00', 0x0, 0x0, 0x0, 0x0, 0x0) pipe2$9p(&(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) fsconfig$FSCONFIG_CMD_CREATE(0xffffffffffffffff, 0x6, 0x0, 0x0, 0x0) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000140)='./file0\x00', 0x7ff, 0x1, &(0x7f0000000200)=[{&(0x7f0000000180)="798cdbd974df52094bd74cf538ffe1bb9de3b34fa85b0838a2eea4db4a1769b17aecaf4bef49a8a79f4139732c83ce", 0x2f, 0x2}], 0x0, &(0x7f0000000240)={[], [{@context={'context', 0x3d, 'root'}}, {@fscontext={'fscontext', 0x3d, 'system_u'}}, {@func={'func', 0x3d, 'FILE_MMAP'}}]}) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, 0x0) clone3(&(0x7f00000003c0)={0x123363500, &(0x7f00000000c0), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x4e) mount$9p_fd(0x0, &(0x7f0000000040)='./file0\x00', &(0x7f00000001c0), 0x0, &(0x7f0000000100)=ANY=[@ANYBLOB='trans=fd,rfdno=', @ANYRESHEX, @ANYBLOB="4bf762646e6f3d", @ANYRESHEX=r0, @ANYBLOB=',\x00']) 03:34:28 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = socket$inet_udp(0x2, 0x2, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) setsockopt$sock_timeval(r0, 0x1, 0x49, &(0x7f0000000000)={0x77359400}, 0x10) 03:34:28 executing program 0: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {r0}], 0x2, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:28 executing program 5: setsockopt$inet6_IPV6_HOPOPTS(0xffffffffffffffff, 0x29, 0x36, &(0x7f0000000300)=ANY=[@ANYBLOB="290000008a705c6d60a22cc800000000244dc4851b638f92ee37632e08a5fc2f09a854e788f44966334f7d10a3d9ceb4acfec1fa30f34281729f2b219a312a1b0feed146c3adfdcbae94cfb86bb2500e505d02e2ba2c3f9939e18a50fb899f524ee998fb222e721663e7adda22be99b4a04f9a3bc3cd9b2877760ec8740768870e0176303b7e0000000000000000000000000000aa7ce178b5c276cf7010935c748441e30724fa1959a40566d73975f9e215767d"], 0x10) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) openat$loop_ctrl(0xffffffffffffff9c, &(0x7f0000000040), 0x0, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f00000597c0)={0x0, [], 0xff, "3e3b3204ece552"}) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$FAT_IOCTL_GET_VOLUME_ID(0xffffffffffffffff, 0x80047213, 0x0) ioctl$EXT4_IOC_MOVE_EXT(0xffffffffffffffff, 0xc028660f, &(0x7f0000000040)={0x0, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x8}) epoll_create(0x4) syz_init_net_socket$bt_hci(0x1f, 0x3, 0x1) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) setsockopt$inet6_mtu(0xffffffffffffffff, 0x29, 0x31, &(0x7f0000000000), 0x4) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) io_setup(0x1f, &(0x7f0000000640)=0x0) r1 = syz_open_dev$tty1(0xc, 0x4, 0x1) io_submit(r0, 0x5, &(0x7f0000000100)=[&(0x7f0000000000)={0x0, 0x0, 0x0, 0x1, 0x0, r1, &(0x7f0000000600)="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", 0x6c0}]) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000180)=0x1) [ 1855.892005] random: crng reseeded on system resumption 03:34:28 executing program 2: io_destroy(0x0) [ 1855.939615] 9pnet_fd: Insufficient options for proto=fd [ 1855.974990] Restarting kernel threads ... done. 03:34:28 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:28 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {}], 0x2, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:28 executing program 3: syz_mount_image$ext4(0x0, &(0x7f0000000100)='./file1\x00', 0x0, 0x0, 0x0, 0x0, 0x0) mount$9p_unix(&(0x7f0000000000)='./file1\x00', &(0x7f0000000300)='./file1\x00', 0x0, 0x91010, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) move_mount(0xffffffffffffff9c, &(0x7f0000000480)='./file1\x00', 0xffffffffffffff9c, &(0x7f0000000080)='.\x00', 0x71) 03:34:28 executing program 2: r0 = socket$inet6_udp(0xa, 0x2, 0x0) setsockopt$SO_TIMESTAMPING(r0, 0x1, 0x41, &(0x7f0000000240)=0x43cf, 0x4) sendmmsg$inet(r0, &(0x7f0000002a00)=[{{&(0x7f0000000140)={0x2, 0x4e21, @remote}, 0x10, 0x0}}], 0x1, 0x0) recvmmsg(r0, &(0x7f0000002140)=[{{0x0, 0x0, 0x0}}], 0x1, 0x40012020, 0x0) 03:34:28 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(0xffffffffffffffff) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="020029bd7000ffdbdf250d0000001c000980080002000008000008000100ff07000008000200020000001c0009800800020017d50000080001000100000008000200090000003c00038008000200000400000800030085dc06010800030003000000080001000437d9000100080002000800000008000200d30500000800030002007ae55d74e3b9e2f4272a0c090874d800aa3085dc14cf3d35"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) r2 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ff1000/0x3000)=nil) shmat(r2, &(0x7f0000ff6000/0x4000)=nil, 0x7000) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) 03:34:28 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000780)={0xffffffffffffffff}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000001800)) 03:34:28 executing program 7: request_key(&(0x7f0000000a80)='cifs.spnego\x00', &(0x7f0000000ac0)={'syz', 0x2}, 0xfffffffffffffffe, 0x0) 03:34:29 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) r2 = openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x0, 0x0) r3 = openat$cgroup_pressure(r2, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r3, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r4 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r4, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r5 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r5, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r5, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r5, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:29 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) 03:34:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000780)={0xffffffffffffffff}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000001800)) 03:34:29 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) openat$loop_ctrl(0xffffffffffffff9c, 0x0, 0x0, 0x0) socket$nl_route(0x10, 0x3, 0x0) fchown(0xffffffffffffffff, 0x0, 0xee01) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x1}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_dev$tty1(0xc, 0x4, 0x1) write$binfmt_aout(r0, &(0x7f0000001500)={{0x0, 0xa5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7ff}, "e412ede5064e145c17d490d427d29fd734988974534e7df579c72831bccc57b6b5f8151a3fac5decfd98dbbb8daba2e7f6e2c5e0c0819b261153bd420112bc0f5b346cfc4e80b0f50d46e8c7ebfec487a8bd380fc62d1717eca379378c0fd5cc6f725779fde5be4b1d03766ba14284b89aae9aab02fd50dbccb9c43c33cd38d779c84c5496cd38ce7f985f62f64b9a1e26e49ead38365ce9faaf370759811642fcaae7ff999040f47aa6644da370cfced53234d577e7d598d10c92509eef5fd0fec125f789b788716b90e710d898ca66467b6524093c28e8361b5f103a3042000f", ['\x00', '\x00', '\x00', '\x00', '\x00']}, 0x601) 03:34:29 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) 03:34:29 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {}], 0x2, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:29 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(0xffffffffffffffff) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="020029bd7000ffdbdf250d0000001c000980080002000008000008000100ff07000008000200020000001c0009800800020017d50000080001000100000008000200090000003c00038008000200000400000800030085dc06010800030003000000080001000437d9000100080002000800000008000200d30500000800030002007ae55d74e3b9e2f4272a0c090874d800aa3085dc14cf3d35"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) r2 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ff1000/0x3000)=nil) shmat(r2, &(0x7f0000ff6000/0x4000)=nil, 0x7000) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) 03:34:29 executing program 6: close_range(0xffffffffffffffff, 0xffffffffffffffff, 0x2) r0 = syz_mount_image$tmpfs(&(0x7f0000000540), &(0x7f0000000580)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000840)=ANY=[]) getdents(r0, &(0x7f00000000c0)=""/141, 0x8d) getdents64(r0, 0x0, 0x0) 03:34:29 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:29 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000780)={0xffffffffffffffff}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000001800)) 03:34:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(0xffffffffffffffff) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="0000000089fb88771c069eb85d3dda09c388368b4d3a26e9deb9766b36291a7e41900d918de0667103b6252f7506b77acaba15c4d5f7c7115dfb29abeff010a6ed4682bcb1a6478a07f62a4f85a66aa049da5ac6b3c8ddc2a6550600b6655083068a93a88bb41ae5f28d19441dc764678e34941dea099f806261fc4dd267cd3760221cb3fd2c61db8143b314dbdbd1a5be70cd5cd39029c81a92f36bd9c3b85fa2d68d5bfdf4861bde714233be9b289c458e9a5a99186425043227dbbf1c5934517747ddfa1766154f9bfa33ba4ffc9cd048781dc923306897c9c651b10d7c72901558dfa318731d3d04931c7e43c2d1508779545148aefdddc2bf0850437aca21b228f3ffec0cf51014e18dec7fc20d31414a2a0dc9a3dedf258e93732841327b6470a3a9df2a2080362a4e5958434421c277c6095ef97c5cde9b19f3d93722c034de0b545d9a8abbd624347b22ce6fc801c3b470074fbc1edca8a36e5fdb42fbdd461cf51ec2cc09c072a295d8ce72", @ANYRES16=0x0, @ANYBLOB="020029bd7000ffdbdf250d0000001c000980080002000008000008000100ff07000008000200020000001c0009800800020017d50000080001000100000008000200090000003c00038008000200000400000800030085dc06010800030003000000080001000437d9000100080002000800000008000200d30500000800030002007ae55d74e3b9e2f4272a0c090874d800aa3085dc14cf3d35"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) r2 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ff1000/0x3000)=nil) shmat(r2, &(0x7f0000ff6000/0x4000)=nil, 0x7000) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) 03:34:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) 03:34:30 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0xffffffffffffffff, &(0x7f0000000000)='net/udplite\x00') pread64(r0, &(0x7f00000000c0)=""/98, 0x62, 0x0) socket$nl_generic(0x10, 0x3, 0x10) syz_genetlink_get_family_id$nl80211(&(0x7f00000000c0), 0xffffffffffffffff) 03:34:30 executing program 7: r0 = openat$ttyS3(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) ioctl$TIOCMBIS(r0, 0x5416, 0x0) 03:34:30 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) 03:34:30 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:30 executing program 0: openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) ppoll(&(0x7f0000000640)=[{0xffffffffffffffff, 0x6089}, {}], 0x2, &(0x7f0000000680)={0x77359400}, &(0x7f00000006c0)={[0xe125]}, 0x8) 03:34:30 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext={0xfff, 0xed7}, 0x104a2}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000580)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}, 0x0, 0x20, 0x0, 0x0, 0x6e}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x1000004, 0x2811, 0xffffffffffffffff, 0x0) r0 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r0, &(0x7f0000000040)=""/169, 0x200000e9) io_uring_register$IORING_UNREGISTER_EVENTFD(0xffffffffffffffff, 0x5, 0x0, 0x0) pipe2(&(0x7f0000000300)={0xffffffffffffffff, 0xffffffffffffffff}, 0x0) close(0xffffffffffffffff) sendmsg$TIPC_NL_NODE_GET(0xffffffffffffffff, &(0x7f00000002c0)={&(0x7f0000000140), 0xc, &(0x7f0000000180)={&(0x7f0000000600)=ANY=[@ANYBLOB="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", @ANYRES16=0x0, @ANYBLOB="020029bd7000ffdbdf250d0000001c000980080002000008000008000100ff07000008000200020000001c0009800800020017d50000080001000100000008000200090000003c00038008000200000400000800030085dc06010800030003000000080001000437d9000100080002000800000008000200d30500000800030002007ae55d74e3b9e2f4272a0c090874d800aa3085dc14cf3d35"], 0x88}, 0x1, 0x0, 0x0, 0x800}, 0x1000) shmctl$IPC_RMID(0x0, 0x0) shmctl$SHM_LOCK(0x0, 0xb) r2 = shmget(0x0, 0x3000, 0x100, &(0x7f0000ff1000/0x3000)=nil) shmat(r2, &(0x7f0000ff6000/0x4000)=nil, 0x7000) r3 = shmget$private(0x0, 0x14000, 0x0, &(0x7f0000fe7000/0x14000)=nil) shmat(r3, &(0x7f0000ff0000/0x3000)=nil, 0x4000) ioctl$IOC_PR_CLEAR(r1, 0x401070cd, &(0x7f0000000000)={0x10000000000001}) 03:34:30 executing program 4: r0 = getpid() r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x2, 0x0) read(r1, &(0x7f0000000080)=""/1, 0x1) write$cgroup_pid(r1, &(0x7f00000000c0)=r0, 0x12) close(r1) openat(0xffffffffffffff9c, &(0x7f0000000100)='./cgroup/pids.max\x00', 0x2, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000140)='./cgroup.cpu/cgroup.procs\x00', 0x2, 0x0) r2 = openat$cgroup_pressure(0xffffffffffffffff, &(0x7f0000000200)='memory.pressure\x00', 0x2, 0x0) write(r2, &(0x7f00000004c0)="60127878c1aaae90e4660e8ab3798b94bbe465ff65f3d19188c6093136beb24507ef103eb73cc750de4184c6bf9642553195c29c018d51458ff0e9be9556909b3561107b4d74720de7ca454d573413c7c7ffb22c1cf4b8e893406a93cb7a17d973ffb07f27ed9d39b643b4c6dd294e7df035f22d6af462b1e8b1071dc781e62c2df8d4b45640dd0038e19d791f6dc34405b1b30896703e5f0bee63244d6d1e70a392787ea5e17c855fe90693e8a6347ed96c44378ff871b73ea74f5063fd50923a5bab299d3647e0cf133571e39c3298eebeb423096488397f1b8ab359cc518b6fb631908697d766", 0xe8) openat(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/cgroup.procs\x00', 0x296003, 0x0) setxattr$security_evm(&(0x7f0000000300)='./cgroup.net/cgroup.procs\x00', &(0x7f0000000340), &(0x7f0000000380)=@v2={0x5, 0x3, 0x10, 0x237, 0xe4, "4d0d25187a72fd07e5e830cef6cb5fac06f156eac5eb25d3c8dd3637fc5243e4adb4002a9a6acec425fee9e4dad766e7dce6db9561b0bc7b82b9055d278a336d8ab605d18758ff97df9ce6b2eb338cec172262c6386cb75b719357ec11e8535906a26423bdc52e1ed71c739f1d206993f42df64eb5e13d9539a890b8fb708307297990d016861bb8e0a967d0b9d3711b1c8bd3286f51e713be8123c81fbfdbe5ac61ab8eef6952e8ff560f39bd56a20e4b60636c86e1c8dcab1d8160a874c3ec183325ab1e8f7934b3043afbc274f1a2ff2796ea981b42ebdfdfe3a6e6fa3150b935b65c"}, 0xed, 0x1) openat(0xffffffffffffff9c, &(0x7f00000001c0)='./cgroup/cgroup.procs\x00', 0x2, 0x0) r3 = openat$vcsa(0xffffffffffffff9c, &(0x7f0000000180), 0x8400, 0x0) ioctl$SNDRV_SEQ_IOCTL_CREATE_PORT(r3, 0xc0a85320, &(0x7f0000000240)={{0x9, 0x8}, 'port0\x00', 0x4, 0x61, 0x3e, 0x6, 0xfffffeff, 0x7fff, 0x7ff, 0x0, 0x5, 0x5}) r4 = syz_open_procfs(0x0, &(0x7f0000000f00)='mountinfo\x00') read$hiddev(r4, &(0x7f0000000040)=""/169, 0x200000e9) accept$inet6(r4, &(0x7f0000000140)={0xa, 0x0, 0x0, @remote}, &(0x7f0000000180)=0x1c) accept$inet6(r4, &(0x7f0000000000)={0xa, 0x0, 0x0, @private0}, &(0x7f0000000100)=0x1c) openat(r1, &(0x7f0000000480)='./cgroup.cpu/cgroup.procs\x00', 0x1, 0x24) 03:34:30 executing program 3: r0 = syz_open_dev$usbmon(&(0x7f0000000000), 0x0, 0x0) r1 = fcntl$dupfd(r0, 0x0, r0) mmap$IORING_OFF_SQ_RING(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x0, 0x11, r1, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f0000000500)={0x0, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0, 0x0, {r1}}, 0x58) 03:34:30 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) pipe2(&(0x7f0000000780)={0xffffffffffffffff}, 0x0) ioctl$sock_TIOCINQ(r0, 0x541b, &(0x7f0000001800)) 03:34:30 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xcc, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, VM DIAGNOSIS: 11:21:26 Registers: info registers vcpu 0 RAX=1ffffffff0bb1ac7 RBX=ffffffff85d8d638 RCX=ffffffff811897ed RDX=0000000000000000 RSI=ffffffff86092526 RDI=ffffffff85d8d628 RBP=ffffffff85d8d634 RSP=ffff88802ca1f7a8 R8 =ffffffff86092526 R9 =ffffffff8609252a R10=0000000000038001 R11=000000000000772b R12=ffffffff85d8d63c R13=ffffffff85d8d628 R14=ffffffff85d8d630 R15=dffffc0000000000 RIP=ffffffff8112fe3f RFL=00000212 [----A--] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 ffff888000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f773b223c20 CR3=000000001a376000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=8100000000000000 4007 FPR6=8740000000000000 4008 FPR7=8740000000000000 4008 XMM00=00000000000000000000000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=00000000000000000000000000000000 XMM03=00000000000000000000000000000000 XMM04=000000000000000000000000000000ff XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000 info registers vcpu 1 RAX=0000000000000033 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff82503a05 RDI=ffffffff87f24bc0 RBP=ffffffff87f24b80 RSP=ffff888032a4edf8 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000033 R11=0000000000000001 R12=0000000000000033 R13=ffffffff87f24b80 R14=0000000000000010 R15=ffffffff825039f0 RIP=ffffffff82503a5d RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007fe2d89bc700 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 ffff888000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=0000001b2f722000 CR3=0000000020138000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000600 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=8100000000000000 4007 FPR6=8740000000000000 4008 FPR7=8740000000000000 4008 XMM00=ffffffffffffffffff00000000000000 XMM01=ffffffffffffffffffffffffffffffff XMM02=ffffffffffffffffffffffffffffffff XMM03=ffffffffffffffffffffffffffffffff XMM04=ffffffffffffffffffffffff00000000 XMM05=00000000000000000000000000000000 XMM06=0000000000000000000000524f525245 XMM07=00000000000000000000000000000000 XMM08=000000000000000000524f5252450040 XMM09=00000000000000000000000000000000 XMM10=00000000000000000000000000000000 XMM11=00000000000000000000000000000000 XMM12=00000000000000000000000000000000 XMM13=00000000000000000000000000000000 XMM14=00000000000000000000000000000000 XMM15=00000000000000000000000000000000