Warning: Permanently added '[localhost]:9351' (ECDSA) to the list of known hosts. 2022/09/14 11:08:56 fuzzer started 2022/09/14 11:08:57 dialing manager at localhost:33849 syzkaller login: [ 42.224889] cgroup: Unknown subsys name 'net' [ 42.326071] cgroup: Unknown subsys name 'rlimit' 2022/09/14 11:09:12 syscalls: 2215 2022/09/14 11:09:12 code coverage: enabled 2022/09/14 11:09:12 comparison tracing: enabled 2022/09/14 11:09:12 extra coverage: enabled 2022/09/14 11:09:12 setuid sandbox: enabled 2022/09/14 11:09:12 namespace sandbox: enabled 2022/09/14 11:09:12 Android sandbox: enabled 2022/09/14 11:09:12 fault injection: enabled 2022/09/14 11:09:12 leak checking: enabled 2022/09/14 11:09:12 net packet injection: enabled 2022/09/14 11:09:12 net device setup: enabled 2022/09/14 11:09:12 concurrency sanitizer: /sys/kernel/debug/kcsan does not exist 2022/09/14 11:09:12 devlink PCI setup: PCI device 0000:00:10.0 is not available 2022/09/14 11:09:12 USB emulation: enabled 2022/09/14 11:09:12 hci packet injection: enabled 2022/09/14 11:09:12 wifi device emulation: failed to parse kernel version (6.0.0-rc5-next-20220914) 2022/09/14 11:09:12 802.15.4 emulation: enabled 2022/09/14 11:09:12 fetching corpus: 0, signal 0/2000 (executing program) 2022/09/14 11:09:12 fetching corpus: 50, signal 34045/36571 (executing program) 2022/09/14 11:09:12 fetching corpus: 100, signal 44120/47250 (executing program) 2022/09/14 11:09:13 fetching corpus: 150, signal 51932/55421 (executing program) 2022/09/14 11:09:13 fetching corpus: 200, signal 63487/66614 (executing program) 2022/09/14 11:09:13 fetching corpus: 250, signal 69122/72280 (executing program) 2022/09/14 11:09:13 fetching corpus: 300, signal 74298/77240 (executing program) 2022/09/14 11:09:13 fetching corpus: 350, signal 78695/81312 (executing program) 2022/09/14 11:09:14 fetching corpus: 400, signal 82466/84602 (executing program) 2022/09/14 11:09:14 fetching corpus: 450, signal 86433/88108 (executing program) 2022/09/14 11:09:14 fetching corpus: 500, signal 90442/91527 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92446 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92531 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92612 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92682 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92755 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92833 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92903 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/92980 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93038 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93121 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93194 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93269 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93357 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93432 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93505 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93574 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93670 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93756 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93820 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93882 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/93965 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94031 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94104 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94176 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94260 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94328 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94403 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94483 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94562 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94630 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94655 (executing program) 2022/09/14 11:09:14 fetching corpus: 510, signal 91555/94655 (executing program) 2022/09/14 11:09:17 starting 8 fuzzer processes 11:09:17 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 11:09:17 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:09:17 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/dev_mcast\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) [ 62.521920] audit: type=1400 audit(1663153757.645:6): avc: denied { execmem } for pid=282 comm="syz-executor.0" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=process permissive=1 11:09:17 executing program 3: kexec_load(0x0, 0x25, &(0x7f0000003bc0), 0x0) 11:09:17 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 11:09:17 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x8543, 0x0) flock(r0, 0x1) 11:09:17 executing program 6: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) listxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:09:17 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) [ 63.980328] Bluetooth: hci0: unexpected cc 0x0c03 length: 249 > 1 [ 63.982787] Bluetooth: hci1: unexpected cc 0x0c03 length: 249 > 1 [ 63.984379] Bluetooth: hci0: unexpected cc 0x1003 length: 249 > 9 [ 63.985947] Bluetooth: hci1: unexpected cc 0x1003 length: 249 > 9 [ 63.987103] Bluetooth: hci0: unexpected cc 0x1001 length: 249 > 9 [ 63.988638] Bluetooth: hci1: unexpected cc 0x1001 length: 249 > 9 [ 63.992037] Bluetooth: hci0: unexpected cc 0x0c23 length: 249 > 4 [ 63.993932] Bluetooth: hci1: unexpected cc 0x0c23 length: 249 > 4 [ 64.025800] Bluetooth: hci3: unexpected cc 0x0c03 length: 249 > 1 [ 64.031164] Bluetooth: hci0: unexpected cc 0x0c25 length: 249 > 3 [ 64.032420] Bluetooth: hci2: unexpected cc 0x0c03 length: 249 > 1 [ 64.034681] Bluetooth: hci4: unexpected cc 0x0c03 length: 249 > 1 [ 64.036510] Bluetooth: hci5: unexpected cc 0x0c03 length: 249 > 1 [ 64.038453] Bluetooth: hci3: unexpected cc 0x1003 length: 249 > 9 [ 64.039781] Bluetooth: hci5: unexpected cc 0x1003 length: 249 > 9 [ 64.040863] Bluetooth: hci3: unexpected cc 0x1001 length: 249 > 9 [ 64.042335] Bluetooth: hci7: unexpected cc 0x0c03 length: 249 > 1 [ 64.044806] Bluetooth: hci1: unexpected cc 0x0c25 length: 249 > 3 [ 64.046087] Bluetooth: hci2: unexpected cc 0x1003 length: 249 > 9 [ 64.047683] Bluetooth: hci4: unexpected cc 0x1003 length: 249 > 9 [ 64.049101] Bluetooth: hci6: unexpected cc 0x0c03 length: 249 > 1 [ 64.051080] Bluetooth: hci5: unexpected cc 0x1001 length: 249 > 9 [ 64.052232] Bluetooth: hci0: unexpected cc 0x0c38 length: 249 > 2 [ 64.053838] Bluetooth: hci2: unexpected cc 0x1001 length: 249 > 9 [ 64.055430] Bluetooth: hci4: unexpected cc 0x1001 length: 249 > 9 [ 64.056583] Bluetooth: hci7: unexpected cc 0x1003 length: 249 > 9 [ 64.058239] Bluetooth: hci6: unexpected cc 0x1003 length: 249 > 9 [ 64.060942] Bluetooth: hci7: unexpected cc 0x1001 length: 249 > 9 [ 64.066237] Bluetooth: hci0: HCI_REQ-0x0c1a [ 64.068168] Bluetooth: hci3: unexpected cc 0x0c23 length: 249 > 4 [ 64.069437] Bluetooth: hci6: unexpected cc 0x1001 length: 249 > 9 [ 64.069904] Bluetooth: hci5: unexpected cc 0x0c23 length: 249 > 4 [ 64.071540] Bluetooth: hci1: unexpected cc 0x0c38 length: 249 > 2 [ 64.073931] Bluetooth: hci4: unexpected cc 0x0c23 length: 249 > 4 [ 64.075315] Bluetooth: hci3: unexpected cc 0x0c25 length: 249 > 3 [ 64.075402] Bluetooth: hci2: unexpected cc 0x0c23 length: 249 > 4 [ 64.078130] Bluetooth: hci7: unexpected cc 0x0c23 length: 249 > 4 [ 64.080189] Bluetooth: hci4: unexpected cc 0x0c25 length: 249 > 3 [ 64.084248] Bluetooth: hci1: HCI_REQ-0x0c1a [ 64.086405] Bluetooth: hci6: unexpected cc 0x0c23 length: 249 > 4 [ 64.088050] Bluetooth: hci2: unexpected cc 0x0c25 length: 249 > 3 [ 64.090303] Bluetooth: hci4: unexpected cc 0x0c38 length: 249 > 2 [ 64.092143] Bluetooth: hci2: unexpected cc 0x0c38 length: 249 > 2 [ 64.093682] Bluetooth: hci7: unexpected cc 0x0c25 length: 249 > 3 [ 64.095952] Bluetooth: hci6: unexpected cc 0x0c25 length: 249 > 3 [ 64.099065] Bluetooth: hci7: unexpected cc 0x0c38 length: 249 > 2 [ 64.103542] Bluetooth: hci3: unexpected cc 0x0c38 length: 249 > 2 [ 64.103553] Bluetooth: hci4: HCI_REQ-0x0c1a [ 64.105147] Bluetooth: hci6: unexpected cc 0x0c38 length: 249 > 2 [ 64.109357] Bluetooth: hci2: HCI_REQ-0x0c1a [ 64.115441] Bluetooth: hci3: HCI_REQ-0x0c1a [ 64.133830] Bluetooth: hci6: HCI_REQ-0x0c1a [ 64.134720] Bluetooth: hci7: HCI_REQ-0x0c1a [ 64.150908] Bluetooth: hci5: unexpected cc 0x0c25 length: 249 > 3 [ 64.152962] Bluetooth: hci5: unexpected cc 0x0c38 length: 249 > 2 [ 64.159149] Bluetooth: hci5: HCI_REQ-0x0c1a [ 66.107257] Bluetooth: hci0: command 0x0409 tx timeout [ 66.170681] Bluetooth: hci1: command 0x0409 tx timeout [ 66.170715] Bluetooth: hci5: command 0x0409 tx timeout [ 66.171119] Bluetooth: hci7: command 0x0409 tx timeout [ 66.171861] Bluetooth: hci4: command 0x0409 tx timeout [ 66.172412] Bluetooth: hci6: command 0x0409 tx timeout [ 66.173211] Bluetooth: hci2: command 0x0409 tx timeout [ 66.173735] Bluetooth: hci3: command 0x0409 tx timeout [ 68.154886] Bluetooth: hci0: command 0x041b tx timeout [ 68.219820] Bluetooth: hci3: command 0x041b tx timeout [ 68.220446] Bluetooth: hci2: command 0x041b tx timeout [ 68.222047] Bluetooth: hci6: command 0x041b tx timeout [ 68.222511] Bluetooth: hci4: command 0x041b tx timeout [ 68.224999] Bluetooth: hci7: command 0x041b tx timeout [ 68.225454] Bluetooth: hci5: command 0x041b tx timeout [ 68.226774] Bluetooth: hci1: command 0x041b tx timeout [ 70.203738] Bluetooth: hci0: command 0x040f tx timeout [ 70.267665] Bluetooth: hci1: command 0x040f tx timeout [ 70.268125] Bluetooth: hci5: command 0x040f tx timeout [ 70.268559] Bluetooth: hci7: command 0x040f tx timeout [ 70.270099] Bluetooth: hci4: command 0x040f tx timeout [ 70.270543] Bluetooth: hci6: command 0x040f tx timeout [ 70.271687] Bluetooth: hci2: command 0x040f tx timeout [ 70.272119] Bluetooth: hci3: command 0x040f tx timeout [ 72.250664] Bluetooth: hci0: command 0x0419 tx timeout [ 72.314743] Bluetooth: hci3: command 0x0419 tx timeout [ 72.315428] Bluetooth: hci2: command 0x0419 tx timeout [ 72.317419] Bluetooth: hci6: command 0x0419 tx timeout [ 72.318117] Bluetooth: hci4: command 0x0419 tx timeout [ 72.320173] Bluetooth: hci7: command 0x0419 tx timeout [ 72.320889] Bluetooth: hci5: command 0x0419 tx timeout [ 72.321535] Bluetooth: hci1: command 0x0419 tx timeout 11:10:11 executing program 3: kexec_load(0x0, 0x25, &(0x7f0000003bc0), 0x0) 11:10:11 executing program 3: kexec_load(0x0, 0x25, &(0x7f0000003bc0), 0x0) 11:10:11 executing program 3: kexec_load(0x0, 0x25, &(0x7f0000003bc0), 0x0) 11:10:12 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, &(0x7f0000000040)='ramfs\x00', &(0x7f0000000100)="a3", 0x1) 11:10:12 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, &(0x7f0000000040)='ramfs\x00', &(0x7f0000000100)="a3", 0x1) 11:10:12 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:12 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, &(0x7f0000000040)='ramfs\x00', &(0x7f0000000100)="a3", 0x1) 11:10:12 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) [ 117.908048] audit: type=1400 audit(1663153813.031:7): avc: denied { open } for pid=3943 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 117.909981] audit: type=1400 audit(1663153813.031:8): avc: denied { kernel } for pid=3943 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 [ 117.916478] ------------[ cut here ]------------ [ 117.916501] [ 117.916504] ====================================================== [ 117.916508] WARNING: possible circular locking dependency detected [ 117.916512] 6.0.0-rc5-next-20220914 #1 Not tainted [ 117.916518] ------------------------------------------------------ [ 117.916522] syz-executor.1/3944 is trying to acquire lock: [ 117.916528] ffffffff853fa878 ((console_sem).lock){....}-{2:2}, at: down_trylock+0xe/0x70 [ 117.916567] [ 117.916567] but task is already holding lock: [ 117.916570] ffff88800f9cb420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 117.916598] [ 117.916598] which lock already depends on the new lock. [ 117.916598] [ 117.916601] [ 117.916601] the existing dependency chain (in reverse order) is: [ 117.916605] [ 117.916605] -> #3 (&ctx->lock){....}-{2:2}: [ 117.916619] _raw_spin_lock+0x2a/0x40 [ 117.916636] __perf_event_task_sched_out+0x53b/0x18d0 [ 117.916649] __schedule+0xedd/0x2470 [ 117.916659] schedule+0xda/0x1b0 [ 117.916669] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.916690] syscall_exit_to_user_mode+0x19/0x40 [ 117.916709] do_syscall_64+0x48/0x90 [ 117.916723] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.916741] [ 117.916741] -> #2 (&rq->__lock){-.-.}-{2:2}: [ 117.916755] _raw_spin_lock_nested+0x30/0x40 [ 117.916770] raw_spin_rq_lock_nested+0x1e/0x30 [ 117.916783] task_fork_fair+0x63/0x4d0 [ 117.916801] sched_cgroup_fork+0x3d0/0x540 [ 117.916815] copy_process+0x4183/0x6e20 [ 117.916826] kernel_clone+0xe7/0x890 [ 117.916835] user_mode_thread+0xad/0xf0 [ 117.916845] rest_init+0x24/0x250 [ 117.916862] arch_call_rest_init+0xf/0x14 [ 117.916874] start_kernel+0x4c1/0x4e6 [ 117.916884] secondary_startup_64_no_verify+0xe0/0xeb [ 117.916898] [ 117.916898] -> #1 (&p->pi_lock){-.-.}-{2:2}: [ 117.916912] _raw_spin_lock_irqsave+0x39/0x60 [ 117.916927] try_to_wake_up+0xab/0x1920 [ 117.916941] up+0x75/0xb0 [ 117.916952] __up_console_sem+0x6e/0x80 [ 117.916969] console_unlock+0x46a/0x590 [ 117.916985] vprintk_emit+0x1bd/0x560 [ 117.917002] vprintk+0x84/0xa0 [ 117.917018] _printk+0xba/0xf1 [ 117.917037] kauditd_hold_skb.cold+0x3f/0x4e [ 117.917051] kauditd_send_queue+0x233/0x290 [ 117.917066] kauditd_thread+0x5da/0x9a0 [ 117.917080] kthread+0x2ed/0x3a0 [ 117.917096] ret_from_fork+0x22/0x30 [ 117.917108] [ 117.917108] -> #0 ((console_sem).lock){....}-{2:2}: [ 117.917122] __lock_acquire+0x2a02/0x5e70 [ 117.917139] lock_acquire+0x1a2/0x530 [ 117.917155] _raw_spin_lock_irqsave+0x39/0x60 [ 117.917170] down_trylock+0xe/0x70 [ 117.917182] __down_trylock_console_sem+0x3b/0xd0 [ 117.917199] vprintk_emit+0x16b/0x560 [ 117.917215] vprintk+0x84/0xa0 [ 117.917232] _printk+0xba/0xf1 [ 117.917248] report_bug.cold+0x72/0xab [ 117.917261] handle_bug+0x3c/0x70 [ 117.917274] exc_invalid_op+0x14/0x50 [ 117.917287] asm_exc_invalid_op+0x16/0x20 [ 117.917304] group_sched_out.part.0+0x2c7/0x460 [ 117.917314] ctx_sched_out+0x8f1/0xc10 [ 117.917324] __perf_event_task_sched_out+0x6d0/0x18d0 [ 117.917336] __schedule+0xedd/0x2470 [ 117.917346] schedule+0xda/0x1b0 [ 117.917355] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.917375] syscall_exit_to_user_mode+0x19/0x40 [ 117.917392] do_syscall_64+0x48/0x90 [ 117.917405] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.917422] [ 117.917422] other info that might help us debug this: [ 117.917422] [ 117.917425] Chain exists of: [ 117.917425] (console_sem).lock --> &rq->__lock --> &ctx->lock [ 117.917425] [ 117.917441] Possible unsafe locking scenario: [ 117.917441] [ 117.917443] CPU0 CPU1 [ 117.917446] ---- ---- [ 117.917448] lock(&ctx->lock); [ 117.917454] lock(&rq->__lock); [ 117.917460] lock(&ctx->lock); [ 117.917466] lock((console_sem).lock); [ 117.917472] [ 117.917472] *** DEADLOCK *** [ 117.917472] [ 117.917474] 2 locks held by syz-executor.1/3944: [ 117.917481] #0: ffff88806ce37cd8 (&rq->__lock){-.-.}-{2:2}, at: __schedule+0x1cf/0x2470 [ 117.917507] #1: ffff88800f9cb420 (&ctx->lock){....}-{2:2}, at: __perf_event_task_sched_out+0x53b/0x18d0 [ 117.917537] [ 117.917537] stack backtrace: [ 117.917541] CPU: 0 PID: 3944 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220914 #1 [ 117.917555] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 117.917563] Call Trace: [ 117.917567] [ 117.917571] dump_stack_lvl+0x8b/0xb3 [ 117.917587] check_noncircular+0x263/0x2e0 [ 117.917603] ? format_decode+0x26c/0xb50 [ 117.917620] ? print_circular_bug+0x450/0x450 [ 117.917637] ? enable_ptr_key_workfn+0x20/0x20 [ 117.917653] ? format_decode+0x26c/0xb50 [ 117.917669] ? alloc_chain_hlocks+0x1ec/0x5a0 [ 117.917688] __lock_acquire+0x2a02/0x5e70 [ 117.917712] ? lockdep_hardirqs_on_prepare+0x410/0x410 [ 117.917730] ? __mutex_add_waiter+0x120/0x120 [ 117.917751] lock_acquire+0x1a2/0x530 [ 117.917768] ? down_trylock+0xe/0x70 [ 117.917783] ? rcu_read_unlock+0x40/0x40 [ 117.917806] ? vprintk+0x84/0xa0 [ 117.917824] _raw_spin_lock_irqsave+0x39/0x60 [ 117.917840] ? down_trylock+0xe/0x70 [ 117.917854] down_trylock+0xe/0x70 [ 117.917868] ? vprintk+0x84/0xa0 [ 117.917885] __down_trylock_console_sem+0x3b/0xd0 [ 117.917903] vprintk_emit+0x16b/0x560 [ 117.917923] vprintk+0x84/0xa0 [ 117.917941] _printk+0xba/0xf1 [ 117.917960] ? record_print_text.cold+0x16/0x16 [ 117.917983] ? report_bug.cold+0x66/0xab [ 117.917998] ? group_sched_out.part.0+0x2c7/0x460 [ 117.918010] report_bug.cold+0x72/0xab [ 117.918026] handle_bug+0x3c/0x70 [ 117.918040] exc_invalid_op+0x14/0x50 [ 117.918055] asm_exc_invalid_op+0x16/0x20 [ 117.918072] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 117.918085] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 117.918097] RSP: 0018:ffff88801d587c48 EFLAGS: 00010006 [ 117.918106] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 117.918113] RDX: ffff88801b11d040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 117.918121] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 117.918128] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800f9cb400 [ 117.918136] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 117.918148] ? group_sched_out.part.0+0x2c7/0x460 [ 117.918162] ? group_sched_out.part.0+0x2c7/0x460 [ 117.918175] ctx_sched_out+0x8f1/0xc10 [ 117.918189] __perf_event_task_sched_out+0x6d0/0x18d0 [ 117.918205] ? lock_is_held_type+0xd7/0x130 [ 117.918224] ? __perf_cgroup_move+0x160/0x160 [ 117.918236] ? set_next_entity+0x304/0x550 [ 117.918254] ? update_curr+0x267/0x740 [ 117.918274] ? lock_is_held_type+0xd7/0x130 [ 117.918293] __schedule+0xedd/0x2470 [ 117.918307] ? io_schedule_timeout+0x150/0x150 [ 117.918321] ? __x64_sys_futex_time32+0x480/0x480 [ 117.918335] schedule+0xda/0x1b0 [ 117.918347] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.918369] syscall_exit_to_user_mode+0x19/0x40 [ 117.918387] do_syscall_64+0x48/0x90 [ 117.918402] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.918419] RIP: 0033:0x7f143eb02b19 [ 117.918428] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.918439] RSP: 002b:00007f143c078218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 117.918449] RAX: 0000000000000001 RBX: 00007f143ec15f68 RCX: 00007f143eb02b19 [ 117.918457] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f143ec15f6c [ 117.918464] RBP: 00007f143ec15f60 R08: 000000000000000e R09: 0000000000000000 [ 117.918471] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f143ec15f6c [ 117.918479] R13: 00007fffa5c3a0bf R14: 00007f143c078300 R15: 0000000000022000 [ 117.918493] [ 117.973456] WARNING: CPU: 0 PID: 3944 at kernel/events/core.c:2309 group_sched_out.part.0+0x2c7/0x460 [ 117.974156] Modules linked in: [ 117.974401] CPU: 0 PID: 3944 Comm: syz-executor.1 Not tainted 6.0.0-rc5-next-20220914 #1 [ 117.975001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 117.975840] RIP: 0010:group_sched_out.part.0+0x2c7/0x460 [ 117.976251] Code: 5e 41 5f e9 3b b7 ef ff e8 36 b7 ef ff 65 8b 1d ab 15 ac 7e 31 ff 89 de e8 d6 b3 ef ff 85 db 0f 84 8a 00 00 00 e8 19 b7 ef ff <0f> 0b e9 a5 fe ff ff e8 0d b7 ef ff 48 8d 7d 10 48 b8 00 00 00 00 [ 117.977593] RSP: 0018:ffff88801d587c48 EFLAGS: 00010006 [ 117.977993] RAX: 0000000040000002 RBX: 0000000000000000 RCX: 0000000000000000 [ 117.978529] RDX: ffff88801b11d040 RSI: ffffffff81566027 RDI: 0000000000000005 [ 117.979077] RBP: ffff888008660000 R08: 0000000000000005 R09: 0000000000000001 [ 117.979611] R10: 0000000000000000 R11: ffffffff865ac01b R12: ffff88800f9cb400 [ 117.980153] R13: ffff88806ce3d100 R14: ffffffff8547c660 R15: 0000000000000002 [ 117.980680] FS: 00007f143c078700(0000) GS:ffff88806ce00000(0000) knlGS:0000000000000000 [ 117.981284] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 117.981726] CR2: 00007f091bb6beb0 CR3: 000000003d012000 CR4: 0000000000350ef0 [ 117.982258] Call Trace: [ 117.982457] [ 117.982634] ctx_sched_out+0x8f1/0xc10 [ 117.982940] __perf_event_task_sched_out+0x6d0/0x18d0 [ 117.983341] ? lock_is_held_type+0xd7/0x130 [ 117.983681] ? __perf_cgroup_move+0x160/0x160 [ 117.984023] ? set_next_entity+0x304/0x550 [ 117.984347] ? update_curr+0x267/0x740 [ 117.984660] ? lock_is_held_type+0xd7/0x130 [ 117.985003] __schedule+0xedd/0x2470 [ 117.985293] ? io_schedule_timeout+0x150/0x150 [ 117.985641] ? __x64_sys_futex_time32+0x480/0x480 [ 117.986010] schedule+0xda/0x1b0 [ 117.986247] exit_to_user_mode_prepare+0x114/0x1a0 [ 117.986586] syscall_exit_to_user_mode+0x19/0x40 [ 117.986912] do_syscall_64+0x48/0x90 [ 117.987175] entry_SYSCALL_64_after_hwframe+0x63/0xcd [ 117.987527] RIP: 0033:0x7f143eb02b19 [ 117.987777] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 117.988946] RSP: 002b:00007f143c078218 EFLAGS: 00000246 ORIG_RAX: 00000000000000ca [ 117.989443] RAX: 0000000000000001 RBX: 00007f143ec15f68 RCX: 00007f143eb02b19 [ 117.989910] RDX: 00000000000f4240 RSI: 0000000000000081 RDI: 00007f143ec15f6c [ 117.990374] RBP: 00007f143ec15f60 R08: 000000000000000e R09: 0000000000000000 [ 117.990839] R10: 0000000000000003 R11: 0000000000000246 R12: 00007f143ec15f6c [ 117.991313] R13: 00007fffa5c3a0bf R14: 00007f143c078300 R15: 0000000000022000 [ 117.991787] [ 117.991947] irq event stamp: 610 [ 117.992170] hardirqs last enabled at (609): [] exit_to_user_mode_prepare+0x109/0x1a0 [ 117.992791] hardirqs last disabled at (610): [] __schedule+0x1225/0x2470 [ 117.993325] softirqs last enabled at (288): [] __irq_exit_rcu+0x11b/0x180 [ 117.993880] softirqs last disabled at (279): [] __irq_exit_rcu+0x11b/0x180 [ 117.994433] ---[ end trace 0000000000000000 ]--- 11:10:13 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 11:10:13 executing program 6: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) listxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:10:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 11:10:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:10:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/dev_mcast\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) 11:10:13 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x8543, 0x0) flock(r0, 0x1) 11:10:13 executing program 3: r0 = fsopen(&(0x7f0000000000)='ramfs\x00', 0x0) fsconfig$FSCONFIG_SET_BINARY(r0, 0x3, &(0x7f0000000040)='ramfs\x00', &(0x7f0000000100)="a3", 0x1) 11:10:13 executing program 7: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:10:13 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x8543, 0x0) flock(r0, 0x1) 11:10:13 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 11:10:13 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x8543, 0x0) flock(r0, 0x1) 11:10:13 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 11:10:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 11:10:13 executing program 6: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) listxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:10:13 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x8543, 0x0) flock(r0, 0x1) 11:10:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/dev_mcast\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) 11:10:13 executing program 5: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x8543, 0x0) flock(r0, 0x1) 11:10:13 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x77, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x32261, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) 11:10:13 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 11:10:13 executing program 6: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) listxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:10:13 executing program 0: openat$snapshot(0xffffffffffffff9c, &(0x7f0000000000), 0x40, 0x0) 11:10:13 executing program 3: r0 = openat$nvram(0xffffffffffffff9c, &(0x7f0000000080), 0x8543, 0x0) flock(r0, 0x1) 11:10:13 executing program 5: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) listxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:10:13 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 11:10:13 executing program 7: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 11:10:13 executing program 5: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) listxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:10:13 executing program 4: r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x2, 0x0) setsockopt$bt_BT_SNDMTU(r0, 0x112, 0xc, 0x0, 0x0) 11:10:13 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:13 executing program 2: r0 = syz_open_procfs(0x0, &(0x7f00000003c0)='net/dev_mcast\x00') pread64(r0, &(0x7f0000000080)=""/39, 0x27, 0x610) 11:10:13 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:13 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:13 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:13 executing program 5: syz_mount_image$tmpfs(&(0x7f00000006c0), &(0x7f0000000700)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000b80)) stat(&(0x7f0000000680)='./file0\x00', &(0x7f00000007c0)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) listxattr(&(0x7f0000000200)='./file0\x00', 0x0, 0x0) 11:10:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:13 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r1, 0x402, 0x0) 11:10:13 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 11:10:13 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 11:10:13 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r1, 0x402, 0x0) 11:10:13 executing program 6: r0 = syz_init_net_socket$802154_dgram(0x24, 0x2, 0x0) setsockopt$WPAN_SECURITY(0xffffffffffffffff, 0x0, 0x1, &(0x7f0000000000), 0x4) ioctl$sock_SIOCINQ(r0, 0x541b, &(0x7f0000000040)) 11:10:13 executing program 3: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:13 executing program 0: timer_create(0x0, 0x0, &(0x7f0000000080)) clock_gettime(0x0, &(0x7f0000000100)={0x0, 0x0}) timer_settime(0x0, 0x0, &(0x7f0000000140)={{0x0, r0+60000000}, {0x0, 0x989680}}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{}, {0x77359400}}, &(0x7f0000000040)) 11:10:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:13 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:13 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r1, 0x402, 0x0) 11:10:13 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:13 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:13 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:13 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:13 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:13 executing program 4: r0 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r0, 0x402, 0x2) r1 = openat$bsg(0xffffffffffffff9c, &(0x7f0000000000), 0x0, 0x0) fcntl$notify(r1, 0x402, 0x0) 11:10:13 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 3: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 6: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:14 executing program 2: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 0: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) pwritev(r0, &(0x7f0000000340)=[{&(0x7f00000000c0)="2293befa2b5223f8be7218069091d691494bf026f5272d0a4e718a03ddb152485c5ddc844889ed50022c48ece88e1aa60254af", 0x33}, {&(0x7f0000000180)="d478551d7582269c6bdd882ddf4d04891c3b33379d9bb2ced65ed1055c3d5e0ebc88266d649e70a91ac02f13d98f61f99945ad1db0307d8b5ca29bf52e97a3cc42eba620ee7772629058cc52bb9724518da69ccc9bf72e0f808d6a770933d3a02849d5857608b471a264ee353a82e1fd82c0ed14108c34ed71b5bf101cefd23f7222c5c15bb117923544c0f4ea7040c9573b8456520d2b5b43ec72c39bcb4d94b8196d352b864241edf998f5f9e6b38577aa32cb31ceb68ab14515bf8e14ff7510f3e6da522eb707a6f09a8d0476825fbc439f3a8a40d2056010ac9e2339a32817f6f4bb6031484295fe1a4fc3cb1b1fa5aafc75b6", 0xf5}, {&(0x7f0000000280)="a275031cc08c84d77ac215d30c5187ef4ee4a40716b14806a4eabe7918351c794ff9669c4e1ba4c7837f212ef183c5604c691616751d8a4ce878ab9db0f76b5755902a40b7bbeaec3179fc2f52223f122b97dec46487fa09194931c607bcfd30f31cfa7a8f", 0x65}], 0x3, 0x9e74, 0x0) ioctl$FS_IOC_SETFLAGS(r0, 0x40086602, &(0x7f0000000080)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) write(r1, &(0x7f0000000080)="01", 0x41030) 11:10:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 4: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 11:10:14 executing program 5: r0 = socket$netlink(0x10, 0x3, 0x0) openat$pidfd(0xffffffffffffff9c, &(0x7f0000002980), 0x0, 0x0) seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x8, &(0x7f0000002a00)={0x2, &(0x7f00000029c0)=[{}, {0xff}]}) getsockopt$sock_cred(0xffffffffffffffff, 0x1, 0x11, &(0x7f0000002a40), 0x0) r1 = syz_open_dev$vcsu(&(0x7f0000005340), 0x401, 0x4000) statx(0xffffffffffffff9c, &(0x7f0000005380)='./file0\x00', 0x2000, 0x0, 0x0) r2 = clone3(&(0x7f0000005b80)={0xc001100, 0x0, 0x0, 0x0, {}, 0x0, 0x0, 0x0, &(0x7f0000005b40)=[0xffffffffffffffff], 0x1}, 0x58) sendmsg$netlink(r0, &(0x7f0000005d00)={&(0x7f0000000000), 0xc, &(0x7f0000002c40)=[{&(0x7f0000000040)={0x10, 0x0, 0x0, 0x0, 0x0, "", [@generic]}, 0x10}], 0x1, &(0x7f0000005c00)=[@cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00, 0xffffffffffffffff}}}, @rights={{0x18, 0x1, 0x1, [r1, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0xee00}}}, @cred={{0x1c}}, @cred={{0x1c, 0x1, 0x2, {r2, 0xffffffffffffffff, 0xee01}}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0xee01}}}], 0xd8, 0x24004080}, 0x20004000) syz_genetlink_get_family_id$nl80211(&(0x7f0000005d80), 0xffffffffffffffff) 11:10:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 11:10:14 executing program 7: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 0: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 2: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 6: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 1: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x7, 0x0, &(0x7f0000000300)) 11:10:14 executing program 3: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x9, 0x0, 0x0, 0x0, 0x0, 0x100, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x4}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r0 = open_tree(0xffffffffffffff9c, &(0x7f0000000180)='./file0\x00', 0x81101) perf_event_open(&(0x7f0000000100)={0x4, 0x80, 0x8, 0x1, 0x8, 0x3, 0x0, 0x5dee, 0x20, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x0, 0x101, 0x1, @perf_bp, 0x202, 0x0, 0x8, 0x4, 0x8, 0x1, 0xe186}, 0xffffffffffffffff, 0x8, r0, 0x2) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000000040), 0xb}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat$sysfs(0xffffffffffffff9c, &(0x7f0000000040)='/sys/kernel/slab', 0x0, 0x0) lseek(r1, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_EXPIRE(r0, 0xc018937c, &(0x7f00000001c0)={{0x1, 0x1, 0x18, r1}, './file1\x00'}) perf_event_open(&(0x7f00000007c0)={0x5, 0x80, 0x7, 0x20, 0xce, 0x20, 0x0, 0x2, 0x1211, 0xa, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x2, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x10001, 0x1, @perf_config_ext={0x2, 0x1}, 0x8, 0x100000001, 0x101, 0x4, 0xfffffffffffffffc, 0x7fffffff}, 0xffffffffffffffff, 0x6, 0xffffffffffffffff, 0xf) getdents64(r1, &(0x7f0000000240)=""/226, 0x20000258) perf_event_open(0x0, 0x0, 0xa, 0xffffffffffffffff, 0xa) socket$inet6_udp(0xa, 0x2, 0x0) 11:10:14 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 11:10:14 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_create(0x0, 0x0, &(0x7f0000000400)) timer_getoverrun(0x0) 11:10:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x7, 0x0, &(0x7f0000000300)) 11:10:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_create(0x0, 0x0, &(0x7f0000000400)) timer_getoverrun(0x0) 11:10:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:14 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x7, 0x0, &(0x7f0000000300)) 11:10:14 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0a85322, &(0x7f0000000000)={0x81, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "7a8acf5beb8a5c666bcea8243d0ad819d74a99f1f00b9b38e1df323dc042efb0"}) 11:10:14 executing program 4: syz_mount_image$tmpfs(&(0x7f0000000200), &(0x7f0000000240)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000000100)=ANY=[]) chroot(&(0x7f0000000040)='./file0\x00') umount2(&(0x7f00000000c0)='./file0\x00', 0x2) 11:10:14 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_create(0x0, 0x0, &(0x7f0000000400)) timer_getoverrun(0x0) 11:10:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_create(0x0, 0x0, &(0x7f0000000400)) timer_getoverrun(0x0) 11:10:14 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0a85322, &(0x7f0000000000)={0x81, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "7a8acf5beb8a5c666bcea8243d0ad819d74a99f1f00b9b38e1df323dc042efb0"}) 11:10:14 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:14 executing program 5: r0 = socket$inet_udp(0x2, 0x2, 0x0) getsockopt$sock_timeval(r0, 0x1, 0x7, 0x0, &(0x7f0000000300)) 11:10:14 executing program 3: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 7: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:14 executing program 0: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_create(0x0, 0x0, &(0x7f0000000400)) timer_getoverrun(0x0) 11:10:14 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_create(0x0, 0x0, &(0x7f0000000400)) timer_getoverrun(0x0) 11:10:15 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0a85322, &(0x7f0000000000)={0x81, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "7a8acf5beb8a5c666bcea8243d0ad819d74a99f1f00b9b38e1df323dc042efb0"}) 11:10:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 4: seccomp$SECCOMP_SET_MODE_FILTER_LISTENER(0x1, 0x0, &(0x7f0000000000)={0x1, &(0x7f0000000100)=[{0x6, 0x0, 0x0, 0x7fff0000}]}) timer_create(0x0, 0x0, &(0x7f0000000400)) timer_getoverrun(0x0) 11:10:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 1: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0a85322, &(0x7f0000000000)={0x81, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "7a8acf5beb8a5c666bcea8243d0ad819d74a99f1f00b9b38e1df323dc042efb0"}) 11:10:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 6: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0a85322, &(0x7f0000000000)={0x81, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "7a8acf5beb8a5c666bcea8243d0ad819d74a99f1f00b9b38e1df323dc042efb0"}) 11:10:15 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:15 executing program 3: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 4: getrandom(0x0, 0x0, 0x6) 11:10:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:15 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1) 11:10:15 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0a85322, &(0x7f0000000000)={0x81, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "7a8acf5beb8a5c666bcea8243d0ad819d74a99f1f00b9b38e1df323dc042efb0"}) 11:10:15 executing program 6: clone3(0x0, 0x0) 11:10:15 executing program 2: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 4: getrandom(0x0, 0x0, 0x6) [ 120.135175] audit: type=1400 audit(1663153815.258:9): avc: denied { read } for pid=4238 comm="syz-executor.1" scontext=system_u:system_r:kernel_t:s0 tcontext=system_u:system_r:kernel_t:s0 tclass=perf_event permissive=1 11:10:15 executing program 7: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./cgroup/cgroup.procs\x00', 0x0, 0x0) read(r0, &(0x7f0000004c80)=""/102392, 0x10) r1 = syz_open_dev$tty20(0xc, 0x4, 0x1) sendfile(r1, r0, &(0x7f0000000000), 0xc31) 11:10:15 executing program 5: pipe(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) pipe(&(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$int_in(r2, 0x5452, &(0x7f00000000c0)=0xffff) vmsplice(r1, &(0x7f0000002640)=[{&(0x7f0000000080)="9b", 0x1}], 0x1, 0x0) tee(r0, r3, 0xffffffffffffff32, 0x0) 11:10:15 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1) 11:10:15 executing program 4: getrandom(0x0, 0x0, 0x6) 11:10:15 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1) 11:10:15 executing program 6: prctl$PR_MCE_KILL(0x35, 0x0, 0x10) 11:10:15 executing program 0: r0 = openat$sndseq(0xffffffffffffff9c, &(0x7f0000000240), 0x0) ioctl$SNDRV_SEQ_IOCTL_QUERY_NEXT_CLIENT(r0, 0xc0a85322, &(0x7f0000000000)={0x81, 0x0, 'client1\x00', 0x0, "17e14b6adf597130", "7a8acf5beb8a5c666bcea8243d0ad819d74a99f1f00b9b38e1df323dc042efb0"}) 11:10:15 executing program 7: syz_genetlink_get_family_id$batadv(&(0x7f0000000540), 0xffffffffffffffff) 11:10:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x6}) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x9, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x2}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x880) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) 11:10:15 executing program 4: getrandom(0x0, 0x0, 0x6) 11:10:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:10:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000042, 0x0) 11:10:15 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 6: prctl$PR_MCE_KILL(0x35, 0x0, 0x10) 11:10:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000042, 0x0) [ 120.414605] hrtimer: interrupt took 17603 ns 11:10:15 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000042, 0x0) 11:10:15 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 1: r0 = perf_event_open(&(0x7f0000000200)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) readv(r0, &(0x7f0000000380)=[{&(0x7f00000014c0)=""/4096, 0x1000}], 0x1) 11:10:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:10:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x6}) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x9, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x2}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x880) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) 11:10:15 executing program 6: prctl$PR_MCE_KILL(0x35, 0x0, 0x10) 11:10:15 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 4: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="5bf20b22a8e54362d1b4c4dc05ebbc8bb357260beb146bb53358be99f3b5760fcf7a8eb94efe0ef2285ff2c79d5255f4fe75c11f2f410073b56f3dbb4b250dd4f074042c8cca87fc6de323658f4ba389a682e6ef9374c92caca46e16cf47cc0d60ec26abcd21e02bfee98523ef828a7fc9a8ac75d3ba5d04933880d362ab98c02c688c62aa403d6b154a46a1448e6f1af0bc744203f1a594bed0d71b549f69575cefca0084d4621d7b4a7683900998b0456c88c6fb0c92b5029deb125f41ddbbd805dde760603216c0651a6e6003c68fc97dfe526e8460d80b5a13bd51c94791fae56921fe32a8b5ad15ef9df243992d36dfaf241788788433246c55d991ca18") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 6: prctl$PR_MCE_KILL(0x35, 0x0, 0x10) 11:10:15 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 3: r0 = socket$inet_icmp_raw(0x2, 0x3, 0x1) sendmsg$inet(r0, &(0x7f0000000780)={&(0x7f0000000000)={0x2, 0x0, @local}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="6fb9", 0xffeb}], 0x1, &(0x7f0000000700)=[@ip_pktinfo={{0x1c, 0x0, 0x8, {0x0, @remote, @broadcast}}}], 0x20}, 0x0) recvmmsg(r0, &(0x7f0000001c00)=[{{0x0, 0x0, 0x0}}, {{0x0, 0x0, 0x0}}], 0x2, 0x40000042, 0x0) 11:10:15 executing program 5: perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0x76, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) clone3(&(0x7f00000001c0)={0x123363500, &(0x7f0000000180), 0x0, 0x0, {}, 0x0, 0x0, 0x0, 0x0}, 0x58) 11:10:15 executing program 1: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x6}) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x9, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x2}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x880) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) 11:10:15 executing program 7: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:15 executing program 2: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x6}) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x9, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x2}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x880) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) 11:10:15 executing program 4: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x1200}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) fallocate(r1, 0x0, 0x0, 0x87ffffc) readv(0xffffffffffffffff, &(0x7f0000000300)=[{&(0x7f0000000140)=""/147, 0x93}, {&(0x7f0000000200)=""/116, 0x74}], 0x2) openat$sndseq(0xffffffffffffff9c, &(0x7f00000003c0), 0x40200) r2 = socket$nl_netfilter(0x10, 0x3, 0xc) r3 = getpid() rt_tgsigqueueinfo(r3, 0x0, 0x0, &(0x7f0000000000)={0x0, 0x0, 0x6}) openat$sr(0xffffffffffffff9c, &(0x7f0000000140), 0xd40, 0x0) syz_open_procfs(0x0, &(0x7f0000000380)='net/igmp6\x00') r4 = dup3(r2, 0xffffffffffffffff, 0x0) sendmsg$NFNL_MSG_CTHELPER_NEW(r4, &(0x7f00000004c0)={&(0x7f0000000340)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000480)={&(0x7f0000000440)={0x28, 0x0, 0x9, 0x5, 0x0, 0x0, {0x5, 0x0, 0x8}, [@NFCTH_QUEUE_NUM={0x8, 0x3, 0x1, 0x0, 0x2}, @NFCTH_POLICY={0xc, 0x4, 0x0, 0x1, {0x8, 0x1, 0x1, 0x0, 0x3}}]}, 0x28}, 0x1, 0x0, 0x0, 0x10}, 0x880) fcntl$dupfd(0xffffffffffffffff, 0x0, r0) 11:10:16 executing program 0: mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/syz1\x00', 0x1ff) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) r1 = syz_open_procfs(0x0, &(0x7f0000000140)='stack\x00') lseek(r1, 0x0, 0x1) ioctl$FS_IOC_SETFSLABEL(r1, 0x41009432, &(0x7f00000003c0)="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") r2 = socket$inet6(0xa, 0x3, 0x2) setsockopt$inet6_int(r2, 0x3a, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r1, 0xc0189372, &(0x7f0000000080)={{0x1, 0x1, 0x18, r2, {0xffff}}, './file0\x00'}) ioctl$VT_RESIZEX(r1, 0x560a, &(0x7f0000000040)={0x6, 0x232, 0x81, 0x20, 0x3, 0xfc00}) ioctl$KDSKBSENT(r0, 0x4b52, 0x0) 11:10:16 executing program 3: r0 = perf_event_open(&(0x7f0000000080)={0x2, 0x80, 0xc2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0 VM DIAGNOSIS: 11:10:13 Registers: info registers vcpu 0 RAX=0000000000000020 RBX=00000000000003f8 RCX=0000000000000000 RDX=00000000000003f8 RSI=ffffffff822b24f1 RDI=ffffffff87641b60 RBP=ffffffff87641b20 RSP=ffff88801d587698 R8 =0000000000000001 R9 =000000000000000a R10=0000000000000020 R11=0000000000000001 R12=0000000000000020 R13=ffffffff87641b20 R14=0000000000000010 R15=ffffffff822b24e0 RIP=ffffffff822b2549 RFL=00000002 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 00007f143c078700 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f091bb6beb0 CR3=000000003d012000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 00007f143ebe97c0 00007f143ebe97c8 YMM02=0000000000000000 0000000000000000 00007f143ebe97e0 00007f143ebe97c0 YMM03=0000000000000000 0000000000000000 00007f143ebe97c8 00007f143ebe97c0 YMM04=0000000000000000 0000000000000000 ffffffffffffffff ffffffff00000000 YMM05=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000000000 000000524f525245 YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 0000000000000000 00524f5252450040 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=0000000000000003 RBX=0000000000000001 RCX=000000000000f60a RDX=0000000000003227 RSI=0000000000003227 RDI=ffffffff86277750 RBP=ffff88803be9f530 RSP=ffff88803be9f458 R8 =ffffffff852c4640 R9 =ffffffff85edad56 R10=ffffed10077d3ea8 R11=000000000003603d R12=ffff88803be9f519 R13=ffff88803be9f538 R14=ffff88803be9f4d8 R15=ffffffff813227d9 RIP=ffffffff8111b4d0 RFL=00000246 [---Z-P-] CPL=0 II=0 A20=1 SMM=0 HLT=0 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007f3a7b69b1f0 CR3=000000003d284000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff0ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 000055d5a2a245d0 000055d5a2a245d0 YMM01=0000000000000000 0000000000000000 00000000ffffffff 0000000000000000 YMM02=0000000000000000 0000000000000000 00ffff0000000000 0000000000000000 YMM03=0000000000000000 0000000000000000 0000000000000000 00ff0000000000ff YMM04=0000000000000000 0000000000000000 2f2f2f2f2f2f2f2f 2f2f2f2f2f2f2f2f YMM05=0000000000000000 0000000000000000 ffffffffffff0000 0000000000000000 YMM06=0000000000000000 0000000000000000 0000000000006561 6124242f6867632f YMM07=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM08=0000000000000000 0000000000000000 2f0000313a372f6b 636f6c622f766564 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000002000200000 0000002000200000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000