{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) r0 = msgget$private(0x0, 0x423) msgrcv(r0, &(0x7f0000000000)={0x0, ""/242}, 0xfa, 0x1, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:03:41 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xb8, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d17"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 2: msgsnd(0x0, 0x0, 0x0, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:03:41 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget$private(0x0, 0x80) r1 = fork() msgctl$IPC_SET(r0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r1}) statx(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x800, 0x10, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r3 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r4 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r5 = getpgid(0x0) r6 = getpgid(0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000500)={0x148, 0x0, 0x2, 0x70bd29, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r6}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r5}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r3}}]}, 0x148}, 0x1, 0x0, 0x0, 0x40400c1}, 0x40090) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r4, 0x1, 0x11, &(0x7f00000000c0)={r5, r7, r8}, 0xc) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f0000000080), 0x6e, &(0x7f0000000300)=[{&(0x7f0000000280)=""/66, 0x42}, {&(0x7f0000000100)=""/63, 0x3f}], 0x2, &(0x7f0000000340)=[@rights={{0x30, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @rights={{0x2c, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0}}}, @rights={{0x18, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff]}}], 0x98}, 0x22041) r10 = gettid() process_vm_readv(r10, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r10, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgctl$IPC_SET(r0, 0x1, &(0x7f0000000440)={{0x1, 0xffffffffffffffff, r2, 0xffffffffffffffff, r8, 0x86, 0x20}, 0x0, 0x0, 0x0, 0x1, 0x8001, 0x10000, 0x10000, 0x7f, 0x5, 0x8963, r9, r10}) 16:03:41 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r2 = syz_io_uring_setup(0x46ac, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r3, r4, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd=r2}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r5, 0x400, 0x1) recvfrom(r5, &(0x7f0000000740)=""/4096, 0x1000, 0x2, &(0x7f0000001740)=@sco, 0x80) syz_io_uring_submit(0x0, r4, &(0x7f0000000000)=@IORING_OP_READ_FIXED={0x4, 0x2, 0x4007, @fd=r0, 0x0, 0xfff, 0x5, 0x1f, 0x1, {0x1}}, 0x1) syz_io_uring_setup(0x7eb3, &(0x7f00000017c0)={0x0, 0x1e7c, 0x0, 0x3, 0x19d, 0x0, r2}, &(0x7f0000ffe000/0x1000)=nil, &(0x7f0000ffc000/0x4000)=nil, &(0x7f0000001840)=0x0, &(0x7f0000001880)) r7 = mmap$IORING_OFF_SQES(&(0x7f0000ffd000/0x1000)=nil, 0x1000, 0x2000000, 0x20010, r1, 0x10000000) syz_io_uring_submit(r6, r7, &(0x7f0000001900)=@IORING_OP_PROVIDE_BUFFERS={0x1f, 0x5, 0x0, 0x2, 0x3, &(0x7f00000018c0)="51881e7493ec6f7b37f0a4ffde7c70dd4118d2208858a0455e78fedb84d461df47a905d9ace8a38d6bca1f", 0xff, 0x0, 0x1, {0x1}}, 0x6) write$binfmt_aout(r0, &(0x7f0000001940)=ANY=[@ANYBLOB="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"/1447], 0x5a4) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:03:41 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x0, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:03:41 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xb5, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 1: pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) sendmsg$NL80211_CMD_DEL_NAN_FUNCTION(r0, &(0x7f0000000100)={&(0x7f0000000040)={0x10, 0x0, 0x0, 0x8}, 0xc, &(0x7f00000000c0)={&(0x7f0000000080)={0x34, 0x0, 0x721, 0x70bd28, 0x25dfdbfe, {{}, {@val={0x8}, @val={0xc, 0x99, {0x2, 0x13}}}}, [@NL80211_ATTR_COOKIE={0xc, 0x58, 0x59}]}, 0x34}, 0x1, 0x0, 0x0, 0x1}, 0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r1, 0x400, 0x1) openat2(r1, &(0x7f0000000940)='./file0\x00', &(0x7f0000000980)={0x1, 0xc8, 0x2}, 0x18) read(r1, 0x0, 0x2f) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r2 = syz_io_uring_complete(0x0) write$binfmt_aout(r2, &(0x7f0000000180)={{0xcc, 0x5, 0x5, 0x1fe, 0x1de, 0x7fffffff, 0xbb, 0x2}, "df060f470fbafd69cd9172304a05cc73bc6d8fe7d7b96c4f342dbc212dd856ae49fa831c6607be6cd609f0697e7fd48e080679027db3a584cd2c233dd6773dfb73133ecde5616c925e4677e0051df577afc598dcb90cb6733437046f398abcc823f19ffef06c8fa67070ca751d4b576a4c24", ['\x00', '\x00', '\x00', '\x00', '\x00', '\x00', '\x00']}, 0x792) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:03:41 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r1 = msgget$private(0x0, 0x20) r2 = gettid() process_vm_readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r2, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgrcv(r1, &(0x7f0000001400)=ANY=[@ANYBLOB="17045699a22279cca79a0fcf73582203ba5031e849020ea8ae9c16a65ac8b1f2881e60bb0356aa3e89fd6df99a40b2b21d31000fcde9e9994bd58f44f1d8372fd5d57865c35a17673e50a159e9f4a45e9c5a4c1fbb37ab551103eee011d054ff089705e55d943fbd0005ab7cf4a90dffb2716128361238f8ff864fd788f176e48da88fa5c50303092446ba480aad930e34ee85badec7ab5b0e59dfb432dbec0014c7f098f10c9d2e894f6c219e6a918345830faef9a988f2b1f69ef5225935f62aa35771f7d0c0c867634d160e59442056e1aa7856714a537ce4a7a0792e48a948c2fe73fed820abb66d6d390a95", @ANYRESDEC=r2, @ANYRESOCT, @ANYRES64, @ANYRESHEX, @ANYRES32=r0, @ANYRESHEX=r1], 0xfe, 0x1, 0x1800) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:03:41 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xb8, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d17"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 2: msgsnd(0x0, &(0x7f0000000140), 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:03:41 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:41 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:03:41 executing program 7: r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) syz_open_procfs(r0, &(0x7f0000000000)='attr\x00') msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:03:57 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x4c) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:03:57 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:03:57 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) r0 = msgget$private(0x0, 0x80) r1 = fork() msgctl$IPC_SET(r0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r1}) msgrcv(r0, &(0x7f0000000000)={0x0, ""/20}, 0x1c, 0xcfa3c3cdcce90415, 0x3000) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:03:57 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:57 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xb9, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d1783"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:57 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) r0 = msgget(0x3, 0x61) msgsnd(r0, &(0x7f0000000000)={0x1, "360b8cd8b722c4eec3e4f39e20aa9198b907e3ecae39381826b080d340ea4c3f1fd7c06106228ee34f35f119d8c349de61de904e58fdbf973de0c5bdff48d6fc787e6c7d4ce133f0fe6b6a76cd14e4960a686862d9024af48b2e2ea24dafaf8d51004274b2cb48e692f23ae7f83d1faae11f7b"}, 0x7b, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:03:57 executing program 2: msgsnd(0x0, &(0x7f0000000140), 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:03:57 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:57 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xb9, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d1783"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:57 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) 16:03:57 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:03:58 executing program 7: msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="010000000000000008eb031ee92bb1600e30b81d70117400aa375e397b175c6f5a4743c9e7e0a7bc28d43e536029a93b696a1cea2acabc"], 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000040)={0x2, "bf737e4e1b6b55799467f7f29ad29b9cb2833a01a579dbc86423a4d51c7b2a8dc96fe31e390dd3d8c21902e6dc15bcb16a4edb2e285d21f276e26116e295c91391f61c9ecb9f4e676d12cbc04c56155ab769baa90d14c12b59bd7f0b613918e1bc02b050555f8aa882d74dcf36d850cc972c2085650e96f6b74c067a7e38f2280489ad2bbaa55e6e16a98a660fb0c4ff9a2b7cb1c52ed62623a2366f25f9b7e208d160135662d034bd5e079c28cd4528b520b6"}, 0xbb, 0x0) 16:04:15 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:04:15 executing program 7: msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="faffffff00000000"], 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:15 executing program 2: msgsnd(0x0, &(0x7f0000000140), 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:15 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xb9, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d1783"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:15 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:15 executing program 1: msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="8100000000000000"], 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$TIOCGSID(r0, 0x5429, &(0x7f00000000c0)=0x0) r2 = getpgid(0xffffffffffffffff) recvmsg$unix(r0, &(0x7f0000003040)={&(0x7f0000001c00)=@abs, 0xba, &(0x7f0000002f80)=[{&(0x7f00000001c0)=""/22, 0x16}, {&(0x7f0000001cc0)=""/101, 0x65}, {&(0x7f0000001d40)=""/207, 0xcf}, {&(0x7f0000001e40)=""/109, 0x70}, {&(0x7f0000001ec0)=""/42, 0xcb2466ba69db6c3f}, {&(0x7f0000000200)=""/117, 0x74}, {&(0x7f0000003440)=""/4105, 0x1000}], 0x7, &(0x7f0000003000)=[@cred={{0x1c, 0x1, 0x2, {0x0}}}], 0x17}, 0x2) sendmsg$netlink(r0, &(0x7f0000001bc0)={&(0x7f0000000000)=@kern={0x10, 0x0, 0x0, 0x100}, 0xc, &(0x7f0000001b40)=[{&(0x7f0000000280)={0xf0, 0x26, 0x200, 0x70bd25, 0x25dfdbfb, "", [@generic="d941c77dba719f32da52a20885b348c3a36c125c6f403b0223a3b0e8489e3e61f50acc9c77ff9f65091df09c0c37b97fa059c7c9eae77d", @nested={0xc, 0x30, 0x0, 0x1, [@typed={0x8, 0x73, 0x0, 0x0, @ipv4=@loopback}]}, @nested={0x95, 0x7f, 0x0, 0x1, [@generic="e1914ec74db2552e0649c1cfd7cea53533279024eaf81fcf306287f742be07a9c9a53ea3b06d39975794c96715520800942acb9073cef63fdedfadfb7611e9aa62cb61134b5445e3b41833dba0b919640e7dd36e9341214105ba9b0de11619cc5751946d97b5b8443cd3d43cec891f66def437d2d244a2348285a05c0bc30f9fc30451947c4cbfc57cc88637bcf75fc60e"]}, @generic="16c0f5"]}, 0xf0}, {&(0x7f0000003080)=ANY=[@ANYBLOB="b4030000380000042abd7000fedbdf259cfe82bc5dd8ae7bf42eb34115c2b85aa3c43b69cccc5a66b10a487b7288ba46ba43dc1cc13f4e6c957164dc79bcfda4ad41bb51a0b9624ad4300e01d25e7b733cf03a42fe4e8328b04dbc1c1ed6aa1985fba8a2fbfd5d4e0c35d5bc2d5e7be6748efe8b0ce1a173d7a2099a767599fa34ccca8b1325ca2d86bbf1bad338c4a4e44b8a3c7ca6ee008b31f97eb565441112fd49652b0a083f7ef67c2f30639477f97b0e940e2a99d46c46d318109e6df0845c00eea5e15f46e51d2340f81c721150915ecba5f808170dc30e2b09c7652c799d01b26469149652acf8f30147800c0083000900000000000000b868f8396d9f1f0c731a913a3f5b2675451a203eb5f487293722ff8fdfcfde4f194756ce0d4cd940a3bcb641ceb353c11ff4441eba06aa2fc0c4f7cf178f32901babcfbb1cc395ec19ee2e0c055c5725c9b7656aff3e78fcfa7ab29e5fb51cf86cb43956cad1e7b098578e4aa7dfb960ab0808005400", @ANYRES32=r3, @ANYBLOB="1f52537a453273f5cd6ddb820be4eb4ac05e4ee8567ca27202428bac7bb71a9efe4c94ed754a9fc183171190834a4ab0f46fdc00eb4332eceb770c55d3e4b838307ce0bf68247a606ac8fb6e14800b7cfa79ad2510704ee001e4cb80ac31744928afcdabd83a5b72fb81152c97801c2faab2aae20fe7d7db292b3866689e36cd3baf86058c8951c8b971324f1213511575949c698f292b33c386956e1aef8cecf8d547448026ccd73e570365b99053d8c39cf2262d520a9b58ccb6d15fcccf945658f8563c249c1e50a8a552d9f99f7656e39662dfe7537830bded3faf7d3c961a2539e8c9e59832cf49b7ecd7173f00c3d6ab5cc55a949fd5896f0c2f42891abd1f66c1014880d2f6aa03b5027001866cf5fd6e43e3d5954527766d7e8c23001fc22aa9bf2b479a44e88a3a35980a08a654058051f0b040545e4539ec1e9e89b0b2a0d597fb6a35496c04001d0007004800402c000008006300ac141425cb779e086382d86fd072c400daff5ce2b18448c0ab86136c4c27d27a8ad6b908422ac992b90587f0d25587fccffc778c0d7d379c91bf878f1704df95a24a9ed1165f36b1ffb26edfda97555aff700c8ec67e6e5c5c909c2d95697824264d39464b03058e52e7d54a0827b6cf4362614f5f80005750f27d006ff448c05560ea63eb43f837c8b0d92a56401f01417717040b584c20e1c937ffc19b2b3d5db5be72640e5485c7e8e5796c1635a9a973edaacae34dfdbe843a3c8c021d21bdab4b67f2d31054634341ba29b695c964447029339d0c008200"/575], 0x3b4}, {&(0x7f0000000380)=ANY=[@ANYBLOB="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"], 0x2dc}, {&(0x7f0000000680)={0xcc, 0x28, 0x10, 0x70bd2b, 0x25dfdbfe, "", [@generic="446dd905a65b0fcfd955864902628fc0933cc1d3f607adf6218783ee9ea315683edf8eb0647727193804e4f85e4915c242fc4a10e6f9d5ecb0aa044c96e1fd36a37a7659070eb17a901335221832a39b4a473b2fe0d9b07ee31fa17fb4204a8495d20f723ed9c476a8eeb1096cbf77d3f3e077093a16995836fee5f0eb6f38df1e03f6fe1db349899e202a41889b827b19dbbdf9004be03378a121051e155b83fe262097560548981b5f4dc1a850", @generic="eeeb8b0c8c7f7301be8e5e"]}, 0xcc}, {&(0x7f0000000100)={0x40, 0x18, 0x400, 0x70bd25, 0x25dfdbff, "", [@nested={0x14, 0x9, 0x0, 0x1, [@typed={0x8, 0x3c, 0x0, 0x0, @u32=0x9}, @typed={0x8, 0x56, 0x0, 0x0, @ipv4=@dev={0xac, 0x14, 0x14, 0x1d}}]}, @nested={0x14, 0x41, 0x0, 0x1, [@typed={0x8, 0x4d, 0x0, 0x0, @pid=r1}, @typed={0x8, 0x54, 0x0, 0x0, @pid=r2}]}, @typed={0x8, 0x29, 0x0, 0x0, @uid=0xffffffffffffffff}]}, 0x40}, {&(0x7f0000000780)={0x40, 0x1d, 0x200, 0x70bd2c, 0x25dfdbfe, "", [@typed={0x4, 0x5f}, @nested={0x2c, 0x7a, 0x0, 0x1, [@generic="bf277c4ae70bc237014d25a0cf2045b01d816c9847f6c1885a51b673c90350e903952a5e0963a557"]}]}, 0x40}, {&(0x7f00000007c0)=ANY=[@ANYBLOB="6c1300002f00000228bd7000fedbdf251012938050e03a0ef7e4076fb739de52c3fece3bd9c0822be85470b412fb31a66d1f013cc7080153586d9ddb4974a7f2f2d5c81c08d55366e4f6789a2f507dafdc6d7a22851e467b7914f0291732633b428c404d1f91b3c80badae581bfc8410955c03953b357f3b9ae9cb5826c4b2dcdf971d6b694eed8e408e628cf6e2adc2623fde9a538a117fa417355ec1b2259324481356bff6ec78752a8ddbf7d34d921211b8097c2592ce16db02095d16aa857641d9571671c8767874550979808b863991085bd71b5f337ad335b30f33923efdb73a2a67f1ad22f268b7b574e29f35b4ca3a978ab0500e4926b9e5e7de32d4faeabf9133bfd57b73ffe397e6f3962d4eaa522741c871d9c1b0cba182cced024d0cdb57688358db2ffc031dca3a3805735b54d48471dbe278a9fdc07a66062091f82c8dbb3a0abfe2b6e589c98581ed408456391298a2926d33145fb9b677d099aa6caaf64615483ec0f89c7f0f8bd599712773ee1938253dbb24589c7cd0e1fbae022305a6f715cc1b5bb3767f1a0aa8fd53f3a528cbc6eeb49c97ce7dedb66d7a82b0ece9c6fa3210c56a4e505a5c4d26867fb22227298b00e5c33d9718312950aa41ec008e8f286eb2ec5782b44708dd61f21848718ca5b9a18972ce09c5bf77d5c29301382d66760427456697075b4dc93af558e3e9112a4a22c426660089461e46f154e232b1086e0c4c710b64c6582b44a80033fd3a9b7b2d7ff2b6ce2e9cd0f2f6610d22f7431c64e9798e755c9fc34e206cd441dfc52761262de08f0031218e7ba409f8309e1908ff6de8e7a40c93932c39c918b70b65fa01f3de2e21b47c960ccb3011d574346533e0478aaba432bc8a30540c2d452fb0d65e624fd367ad00347144217aad6f3654ce233d01fceac92b07fa50826af7a4271e720de070195cc8f98fb0bd674fcce84c2dca23e89d08ce32643f0e233add9cb28b9de88d73a51166eb33d73a5801bfc1a8ae8e2de6e5766c3c2979f4c7d9b10a5e93de2549cb4106d7b21b0846986c1f916c059d12294da580dc459cd5c5da6afabc506fa38830e2d058139e0541f512b8781242509b6b8322f80db311cc22f6f682a59faf42b67077ac7290a5f4ae0a79ef6036f8a80d569488f52cf62b977bb78c2d97c92b40ce8ec7a9977b9b44c663945a3bc8ac3eccb2521fe98301e73241e2d1639dc75202b43d189aa34cee98212dd874dcbe5e7da5f1c1a116b73221e3949787fc9b40e20c84093062f9eb0e64d5aa283b32721054bdcb786ee99c5beeb5362d8aa60336c7dc0668f3c02aa90bb29136a92bf46b8bfce4d2c70883601dc6748f92934ee47ba2ff07c0baec2887240f0f0062bf498c28effb93f57d90a3a45c9050ec8b6e810845d5a83e58cb1406913118eef30cccc667b8a0151559d5fee6874efe12139fb3ed0a06241634c748e3d6ee56ab580c5c58f96242d80e43e2c9bc843c9bfa134b67c0a0694ed73eff600792c88b28fd1d66141a18c3b7d0386736f98ca94684fbfffa533c922f8313d9f6d1bf8323b7a0f1f3b940c2aac7edda7981ba0021fe645b8df6d073f296083afda846c88600efd993c7223fa5674fcaa966d31f6c9f9c34de050030c09640345bd51d071424eb4930928927cb9e6406ccb6b7d67b08845be4806d57854293c1cac0b6dfcd4f7ee86c63f4b408d72d670ecdb5f7247c60711838fbe8caeac96aa74c1dc3a2f1a8e82eb896194e785a8cbc1034d4036a06d55e32e7c3a1cea5a047597cf386bf04723c7acf5ccad9f477aa8ee1e782bd8a2db68489624224f9e7838f1d317753aed627e7a3d6a1d1b0d5567b00bd968ce396b1fa220481bcd110b0a2fba8d7238d402f995173ad6b1d25a9d2d3ce62da1825acac86385423d5d67a5f46322923c998d4c02da78debd3827d7f01a1547ccb3ff634af527b23d9302a14ec3d231a0c176d5a19c76a743ba8ea3f5fb73f3272807e88752db894c786c2517429b4f595c82b0a9d7be84dc3d7fe8615eb95dccd82c5ccd6508b5ff89fcf78f58489ce276ddfe6689f986714f75f9213b9940a67188bb8528dd536b0a143cc2c339c163e0187cf6a1ccb5f825066428c00d027fad94a28a3a57d242282c8ee824528c0367e4448ce42b25605d22aee5db2ba63c56d65fda479677d6a2b20d6824c737fa15df5be08e97f0899897a17de02ac1953b696e2d3cb5dc6e0bfd6b93b4949bf7bdf2aa778b3a8251861619c2e692adf6862e86df21d88b4fc4f3d98c5e09b2841d0c6c1c2e00e530a5d2578725ad2dc10d39ff8d6626fd5cea971d42a5aadb0d4c4a1390dbd965dec96b467afe6516f82cdb8d6a9f00669d4423ab3ca87b45c98879b964b2cfdf1fcfe804ffabaadb0f4901c689dccfffb26baa9bd0939a236cdc03c058e80177939712189791782ed29b564b0595b35a1a2119fa65a99b984e3fadfaef7f7f42500590816ec98d2384b1d0687ff2bb20b93dd268449a124bb712b6bd4506e43e22bef3980c5fe4dac1c1affb19f53854518d093e1cd2a01384b31d05ab1ad5194e479f8d6cda7c9d3f1b995f0a7d2d4497341d597db81f35502826e2dfb2243b8529dd00b8d3eb45095da11116a19824dc660badd8fb4282e52a5dcb8cabdf67d2ba7dd1f80489d2656f85550230405073a8eed42a9e9ad80b338ba42cf78341fab25257191c1e6914786bec43e8e79676e9d39af0f860adeafb2660a4a565c238e7e150e822d61cd82453421cf9f50d3c8775dc78124dd7649c9504a102ab7d27da339ab5f5db56d75c4f5eb5809a4f1a964850dc79c318f0596107d77c3cf71498d51ff5d9acc2c05628255dbaf8cbcabc3aa7c40a18e68007627a303e87876e391633b6fdf7ef13e36f74124dcce3c82fa682f044ecc751afc01685137bb993c7862a69a62356950d6ea22e886e301352845250969bd08d47988000c73315699da836297aba8ee2e4caa12d27847663b1b8c5250b5ffeacfd922e0541d708820f14e18904917ee9bb8a28131313a61a94b7d5f6bf3c83f834bb65d39a30d9e90b4a5cb44560300374a1a8e0d2c3f15df81df60bbdb806171712d3777e7b492c9cf3967193966734198205928d30a5872cc16daee1d55a39e4907f602ddf35a30edefcf215301ee4ae8c126ac7f00867cee7763050d0e8a3117fe02a9ee6791885ecb35f3190bb45cbd6db96e7d2da4b484401c8612f665b3a0f9cd81d9a188ba2b12a536ed5182f81ddfc47003e39e308c4e6c7511164bb27b3c86c23b5508ada384e146873bf62b7eac5bc387d95eabdc1ebd4054e619633084e11adcabe35a3e3e32bddba10925db00882bbe7ec433bf5ecd04bc6719199a20fb81155a7256749b51519e621c05cf8bc134d9628858b4d31c42928262206c12532f82c61fdba2224a0735c6baf8193b5d300dec81e0654c814c38ac0582a67715b151e492b2af8c6c9f6f2c163c83839850fa357af284adc91b4268b8181e50ea161e5036004feb96238c44ac9bf4992bfb07e42de91d3099b9cfd4b426042a919fe19eababa1600925ec9e5511f0db3c912256d62ec10ddbbcfef7bb66c3c7b710caa1bb23c992c249e8e079abe7c2c86dd2ac690018f394c914649a4b4867efee27d561426a37aeca2a7e8b10a8679490672dff6c33b04c7e7816418c3bfb241f93f922ebfcdc7c570c80eb7be5856091a69857a605ba7ed34c44a27f4c7f0470a335625696fbcdad82aea65011dc45d74f51dd6cbea49f9f1d137c180737dcf9f0739f00bb5a6d7e78fbd2390a8ffbda1284fc4720c72bb4c53d9b33811947d06164865c64c8e32cf526db512db8498ef8b81fad3f01dc229e5afcef5e63d8b5c082556c419c3e1333300371ba9f821b5080fa827daf5689eccbc8f75251d3ce09a675e28fe875f0bccf0cfe409338bddef67d2c8a021be5a54e0fc73e27532346b51fa56829261422713953861cf08a1a23138739a481e09f8b7ec3b2dec4a5602ddd57efe814e8ca02ae830d6f146eefae5150bace3dbbd8b4b0a20eab1083f7f8b55d3869a4658a2c73fef9f569a24c37aea62c18628f4e72338b75b3073a332f5383b9aaf16c25ce3cbf5f11ef07544266eea40370dfc3ce60218d989f812d57ff80f19fea27db133ffbc562fa63d24e1e7c1f789bc264915f03beeca9d786f6df3a8553850756ce6277330945064f269745bb31cc9f940f40757228395fe96a0e944890527a84ba60cb7a1f98b21849da093f5ddfd195955170840ece05e26f5b9ca4c8b68c50a6c4e133b082e1bb8b86da2e1035ad9cc152b275564489a270a92cb9f7a18b11bb8a934ad7784d58c1a8a3533144687ddb8957a370320fdb51236272cfc80d244b27735cddd9cc8a8e16fa8789a1e3bc7f28b3ad9e0ef50d9a5af3b0c4f3295a2ec5a17e4b3d33d9cd26776b1325a35d459336c6b1053443075b7838ef614a6fc81d1b4e3d21d9e79c2f6b764d7405d1c01a85274eff17ddb585d02653ce9a5e4fde0989212806ae2cc433313d1e633d1ca07bf7ea828d5df53a1a589cd0a842500d45881f7d4f70dd9ce4f40426d14bf84daef7387ae93cb27c2e4189df4e4d3a5f5252b70088b1c6d7cc38e82f708e01d3680357188825b84a9564addb57cc68cf5b007fe9e189deb77c64cf7c7bc9ebd945fb7b81e34541e7eaa3123c2ad47713806abfe53d42c21de82e961a3fe50dabe8f7238d39cfae2de94091447899814c44f7268c838fd5d3a012c959b4d9ec437ac530ace373ff71a5e3fd795db3c97d6947e55cedeb8ac7e5f5cba999776af504c9d16e83e8f8738fa09128481496981953b63b2057568e941cbad001d6ee8bd0f913e38207c4f41e538b363e08804327f43bbdefc52f06409e630ea64f0ff1edb499a520fe648afc9cd5a3a88fb11b9a70618ccec50b9b6633bb2b1e1a75dc82f88f59b07fc361558fe5704ca088b8adc0e640ce2ca2a12132b168a31dae5ceceaf1382de0b047c96c23100b84cefc98cbfebbebd64434690eff6f40e92c6b8e48a9566fd768183cd0e9d6d2492b630d4f4081d009dd87a31c6fb2d13914ed86a8a41ecea75156667881119ffa46d925078fd5a682a9b86c471f63d90deaf1d153c62b6ff3eb727769c855a95b9ece762a4711676efadaa0b518aa151f067bf3c08b6ffe5d94b780dc9657ba5401fd40dc411ec744909cc7c0e5faa5239eed3c8a85c517717ab90164e5c7f44dfe61e8add3e06d111dbf7ca7f46ff3be3033f0c60331ca891f22b705928d68d414b07038f1cc7eee25dbf510c17800ed22e7e14b7695d0d52083d45695069be738912ac01a69404dae2ed7a303eb420cba0de0fbbffe1d84b272c774004cc6f2fbb8e50e12f8e75aa5e478068b864d272449f3834d8c18e0105f8d05dea8b190f771f3adc5f9c64d744d0c41f6bb22cb97da5a45ca29be82860bc92cfcbe000b99663f3da92dcf957f1d8f4fa8f19fa1cdaedd7d2018fa5ecc3f1d1923772f42dd46f1503ca7b54daa68d646e5441e9534e4c9f2ab2a57a956e57db3f2437e8c3286e6b3a5c9b2c07b7de516f7d63cc800e9f463697bee767179dc59055d942670e3e562170955ec441bcbcbbd9aa1e1907826185ab6536c82c3a279215223bc3b9a7ad622f01d5550041883ae2b04d2ca197a41a775b57662b47c8638098d97863c3a988796ec2764b5a08e2696dd8a72088b3da39c700542cd8263d942f3c250e2011cb9afc44c8bf2112b83a69cd6e4e96d7fb332f64be4a2804eaa3316ff42beba550f1b52237c77924831fdc214002a0000000000000000000000000000000000449a418698566023a73e7b959fdbaf6886513076d60d80dc488ab25fb3756e9d667adb380bee3f93364d1d8863615bad6b8f9ba7ac7f1e65e738c01db88d4af841330a737c343531f902ed65c47d9379b82f8ad273700317e1f5662796d183a226f1843810fe982fddc0fbbcdf6b7e184136ab8e86fc415ebc85942067f53faf07a26e2a462379bb24367129372f5a0646214eb20dd0e1afda698006d00bf5bb606fba451229756181de2d2b85c2c7c05e9e0867e1661985561be3dbec5ab55e1e10ad8ec4be7577d2cc0024f541a8054d8342f7a3b9ec7bb18654215e4c32201c27d9b242c7ab2139e6240a30eae0f173a750cd274fcde4fab8973a84ed47c427b9866ee0def34f16b764405a40a31d08d3eb1c3ec75c91d7674d9463285d30b365544f1639addb9ab791e9c76751ecff9e203c2cc539f458cda11854956ef9f3080041007f00000108000d00", @ANYRES32=0x0, @ANYBLOB="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"], 0x136c}], 0x7, 0x0, 0x0, 0x2004c844}, 0x10) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r4 = getpgid(r1) getpgid(r4) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) r5 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) write$binfmt_aout(r5, &(0x7f0000001f00)={{0x107, 0x3, 0x2, 0x61, 0x3cc, 0xffff, 0x228}, "cef7753092e8f8192985f4ab95bcd0ad8e8819387bb731c909030f896d328b186ac8a353ff24c480b0297bf0c09367f4e516099baa3e09248c6ae2a621470e41ad8953fd63e12189d7eab6a9628811dd7125fd3e6b7075749673978ca85631d243edf58cfca28fecb2b254875cd64de2cd52f2b18441304216d2d7f0003a539ff4a6b4c45b477f193478c1a163e3a34fd10ad7692436650449643035039716e498f1944f2bce604497240edd8a95e01666ea982ddbe5d95ed771ecc1ed748ae8a8d9bbb6d146ede2aa5c8e2ad250c3217565fef0bf1448b451ed58ffea9aca244f93c63414ef1f852e2cb379fda42953d8b5ad867b"}, 0x115) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:15 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000000)={0x0, ""/30}, 0x26, 0x0, 0x800) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000040)={0x0, ""/129}, 0x89, 0x1, 0x0) r0 = msgget$private(0x0, 0x80) r1 = fork() msgctl$IPC_SET(r0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r1}) msgsnd(r0, &(0x7f0000000100)={0x0, "9e865b6ab91a2ffd74da9d589f4eef11baf211cc108b2c925736cf"}, 0x23, 0x800) 16:04:15 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:15 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) r0 = open(&(0x7f0000000000)='./file0\x00', 0x101800, 0x96) write(r0, &(0x7f0000000040)="0bf67767a8224c6abebdb0c9d9da1220c38f9a8c6833d9909295114badb728e19b6724ee6335f8e47f526a247ae79708be69fac3b779bd3e76cdf0c7bb6ee050ab44ddfb60f49dc29175548235e46d8914fc11a015010c8f1ff95bcd0b4978911f345e8045094c530c3b0e0d4dd4fa67d4ca385e239f30c3d744de3d3efdde9d28873575ea119c06eca60ff9530a0fbdab974e48a5e5c11937c196d97dc4ecfc4f2dad1c865ac30b406e7d83ab580eef82032c0b1de1718ea491df2ee14e54b33ce01e8070a47fbbd759134a788b56684818f57e4abfc8742d", 0xd9) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:15 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x1800) 16:04:15 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0xa) 16:04:15 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:15 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:15 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:15 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOVER(r0, 0xc0189372, &(0x7f0000000000)={{0x1, 0x1, 0x18, r0, {0x6}}, './file0\x00'}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r2, 0x400, 0x1) getdents64(r2, &(0x7f0000000180)=""/251, 0xfb) openat(r1, &(0x7f0000000040)='./file0\x00', 0xa1a2012b01ca3113, 0x110) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:15 executing program 7: msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="017ea4553d38ed867910d0f6b962dde4abb1cf91ea"], 0x8, 0x0) r0 = msgget(0x2, 0x528) msgctl$MSG_STAT(r0, 0xb, &(0x7f0000000040)=""/150) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:29 executing program 5: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:04:29 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:29 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) fcntl$setstatus(r0, 0x4, 0x2400) ioctl$FS_IOC_GETVERSION(0xffffffffffffffff, 0x80087601, &(0x7f0000000000)) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:29 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:29 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:04:29 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) r0 = msgget$private(0x0, 0x80) r1 = fork() msgctl$IPC_SET(r0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r1}) msgrcv(r0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x2, 0x6000) msgget(0x2, 0x380) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000080)=""/72) msgsnd(0xffffffffffffffff, &(0x7f0000000000)={0x1, "caf887c77793ef62f4b4d61a25084a9245decf470779b0f32f59e18c655faebfe888ba826f4ac5212911f571d9e51c72ed074463422c8ada0593cd8bd2ddd104ae12d0fd229ff3ffc5da32959b5d8cee7435730629d8a8245b2fb70b49e96899a15efa1a4211e3f455f8986fe5e8fc28ac"}, 0x79, 0x800) r2 = msgget(0x3, 0x12e0e297a0435e0f) msgrcv(r2, &(0x7f0000000100)={0x0, ""/33}, 0x29, 0x0, 0x800) 16:04:29 executing program 7: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000080), 0xffffffffffffffff) r2 = socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(r2, 0x8933, &(0x7f0000000700)={'wlan0\x00', 0x0}) sendmsg$NL80211_CMD_SET_TID_CONFIG(r0, &(0x7f0000001700)={0x0, 0x0, &(0x7f0000000080)={&(0x7f00000000c0)={0x2c, r1, 0x1, 0x0, 0x0, {{}, {@val={0x8, 0x3, r3}, @void}}, [@NL80211_ATTR_TID_CONFIG={0x10, 0x11d, 0x0, 0x1, [{0xc, 0x0, 0x0, 0x1, [@NL80211_TID_CONFIG_ATTR_TIDS={0x6, 0x5, 0xf9}]}]}]}, 0x2c}}, 0x0) sendmsg$NL80211_CMD_SET_CHANNEL(0xffffffffffffffff, &(0x7f00000000c0)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x40000}, 0xc, &(0x7f0000000080)={&(0x7f0000000180)=ANY=[@ANYBLOB="8b90c940dcda1a889b4db29d916ee048f54d144dbc0d4ee195b6f36e2dababa2a246dfe095e517bb41fc15b3002c7249dee50ed2e1586b27caebf2be52b5031903896d7ad9df37eb986f092b3081e3acb917f9920185daa9be6f20cf1f7a448287b7c3a88d530473bb5a5076dcc28d4c3e6b1a615e1740730e64c29521e4f9a9cbe5feb08f83c5bfc7b819d60032cc22806a6ccfeeae02cf5cde35f4a33c13180334c012c43268e8992630920f90c4ed701f755a22e93af00526ad757f22ea65104cc3bb15943121a82f5124ff6a6015e049fb6c56c19ddaaf7fafddc84bc463c16653f0558c3f02000000ed1fefc12f8c", @ANYRES16=r1, @ANYBLOB="20002cbd7000fedbdf254100000008000300", @ANYRES32=0x0, @ANYBLOB="0c0099005700000067000000050019010f0000000800a1000800000008009f0006000000"], 0x40}, 0x1, 0x0, 0x0, 0x44000}, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x1800) 16:04:29 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:29 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:04:29 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) ioctl$AUTOFS_DEV_IOCTL_CLOSEMOUNT(0xffffffffffffffff, 0xc0189375, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff}, './file0\x00'}) openat(r0, 0x0, 0x0, 0x40) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:29 executing program 0: msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0110002000000000b02398d7d39b2c03edaad58ea047f473246d42ed95fd2d4404050ac9f154523fd794830222b27da16fc5312c212f4156a5c6c8b902fac04124c7bd"], 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:29 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:29 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:04:29 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:29 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) ioctl$PERF_EVENT_IOC_SET_FILTER(0xffffffffffffffff, 0x40082406, &(0x7f0000000000)=':\',%(\'\x00') r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000080)={0x0, ""/76}, 0x54, 0x1, 0x800) sendfile(r1, r0, &(0x7f0000000040)=0x3, 0x7ff) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x200800, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:29 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, 0x0, 0x0, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:29 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r1, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000180)=ANY=[@ANYRES32=r2, @ANYRES32=r2, @ANYRESOCT=r0, @ANYRES16=r0, @ANYRES16=r1, @ANYRESHEX=r2], 0xfe, 0x3, 0x800) 16:04:29 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget$private(0x0, 0x204) msgrcv(r0, &(0x7f0000000000)={0x0, ""/255}, 0x107, 0x2, 0x800) 16:04:29 executing program 1: msgsnd(0x0, &(0x7f00000000c0)=ANY=[@ANYBLOB="010040000000800078c75b855f011f473e0f83ccb694fd04fe19c6c04be232b83595968b446b7045b79b9deb06f212f3d1bbb493a07bacaba8b37bc7196b1a1fb568966a87694e57f9c74368d5dcc212d0cada114cedfe587f60eb00"/104], 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(r0, 0x81f8943c, &(0x7f0000000180)) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x20000, 0x0) pipe2(&(0x7f0000000000)={0xffffffffffffffff}, 0x800) ioctl$EXT4_IOC_CHECKPOINT(r1, 0x4004662b, &(0x7f0000000080)=0x1) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:30 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:30 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x0) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:04:43 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r3 = gettid() process_vm_readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r3, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) getpgrp(0xffffffffffffffff) r4 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:43 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:43 executing program 0: ioctl$GIO_UNIMAP(0xffffffffffffffff, 0x4b66, &(0x7f0000000080)={0x2, &(0x7f0000000000)=[{}, {}]}) msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0100000000000000"], 0x8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000180), 0x8000, 0x0) ioctl$KDENABIO(r1, 0x4b36) r2 = gettid() process_vm_readv(r2, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r2, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgrcv(0x0, &(0x7f00000001c0)=ANY=[@ANYRES64, @ANYRESDEC=r2], 0xfe, 0x2, 0x1000) 16:04:43 executing program 1: msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="010000624831a0f55f8b2bbe47935adfb3afc8fda0ecba068b843d31a8c4e492aaa798316e1a47af88d224c331fc8b8408dc6381b7673adc3de8d019be5b00e0377fb56910ba29dc6c1bf02f16fb02eed150a91c0000000000000007babc30099249aae45ccd9dc8846601469edfc09c3d4c5ef2b23410414023e3a824db9630f81ec4b5bd4783af547b200000000000"], 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000000c0)={0x0, ""/98}, 0x6a, 0x0, 0x2000) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:04:43 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r3 = gettid() process_vm_readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r3, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) getpgrp(0xffffffffffffffff) r4 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:43 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:04:43 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:43 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x0, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:44 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:44 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) 16:04:44 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r3 = gettid() process_vm_readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r3, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) getpgrp(0xffffffffffffffff) r4 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:44 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:04:44 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) 16:04:44 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r3 = gettid() process_vm_readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r3, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) getpgrp(0xffffffffffffffff) r4 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:04:44 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x0, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:01 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:01 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r3 = gettid() process_vm_readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r3, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) getpgrp(0xffffffffffffffff) r4 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:01 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x0, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:01 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r3 = gettid() process_vm_readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r3, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) getpgrp(0xffffffffffffffff) r4 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:01 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) 16:05:01 executing program 0: openat$vcsu(0xffffffffffffff9c, &(0x7f0000000040), 0x4c400, 0x0) msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="01000000000000001475790fef36d433f15305"], 0x8, 0x0) r0 = msgget$private(0x0, 0x80) fork() msgctl$IPC_RMID(r0, 0x0) 16:05:01 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r1 = msgget$private(0x0, 0x80) r2 = fork() fstat(r0, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) msgctl$IPC_SET(r1, 0x1, &(0x7f0000000040)={{0x3, 0xffffffffffffffff, 0x0, r4, r3, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000000180)=ANY=[@ANYBLOB="07000000ffdd00000000000000000000004600b2000000000000000000000000000000000000004050c5c843724bed9ed121fe6e1bc8e0439d5e013347fa7cfa6e6b2b0036bbcc82c2e62dd70b1e79a4efa03b6670c77b5377598858348c5bb2a5c994c9d2ba6b9ec0ac74bee8ce3aee899fbf23bf3aba9556054e54189804dd0f353c61480d6b01b8474632ca04dcec4ae7f49269014ed78c09e68bac6a6044e4ab4598b240bab560815659206b4be544abb6bb78e2f8cee4303c91"], 0x1d, 0x3, 0x2000) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:05:01 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:01 executing program 3: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x0, 0x0) 16:05:01 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:01 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:01 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:05:01 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:01 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x0) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:01 executing program 3: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget(0x0, 0x56) msgrcv(r0, &(0x7f0000000000)={0x0, ""/77}, 0x55, 0x1, 0x1800) 16:05:18 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:18 executing program 0: msgsnd(0x0, &(0x7f0000000040)={0x1, "7e1df81d8c770fa3909236aa1857401658975d5a6c0910999323f4aefcd848664d348705e456"}, 0x2e, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r1 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r2 = getpgid(0x0) r3 = getpgid(0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000500)={0x148, 0x0, 0x2, 0x70bd29, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r3}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r0}}]}, 0x148}, 0x1, 0x0, 0x0, 0x40400c1}, 0x40090) getsockopt$inet_IP_IPSEC_POLICY(0xffffffffffffffff, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r1, 0x1, 0x11, &(0x7f00000000c0)={r2, r4, r5}, 0xc) r6 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x4042, 0x0) r8 = creat(&(0x7f0000000040)='./file0\x00', 0x0) r9 = getpgid(0x0) r10 = getpgid(0x0) sendmsg$DEVLINK_CMD_RELOAD(0xffffffffffffffff, &(0x7f00000006c0)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000680)={&(0x7f0000000500)={0x148, 0x0, 0x2, 0x70bd29, 0x25dfdbfe, {}, [{@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x4}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r10}}, {@pci={{0x8}, {0x11}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, 0xffffffffffffffff}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x2}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_ID={0x8, 0x8c, 0x3}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_PID={0x8, 0x8b, r9}}, {@nsim={{0xe}, {0xf, 0x2, {'netdevsim', 0x0}}}, @DEVLINK_ATTR_NETNS_FD={0x8, 0x8a, r7}}]}, 0x148}, 0x1, 0x0, 0x0, 0x40400c1}, 0x40090) getsockopt$inet_IP_IPSEC_POLICY(r6, 0x0, 0x10, &(0x7f0000000180)={{{@in=@multicast1, @in6, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@initdev}, 0x0, @in=@multicast2}}, &(0x7f0000000000)=0xe8) stat(&(0x7f0000000040)='./file1\x00', &(0x7f0000000340)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) setsockopt$sock_cred(r8, 0x1, 0x11, &(0x7f00000000c0)={r9, r11, r12}, 0xc) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000080)={{0x2, 0x0, r5, 0xee01, r12, 0xeb, 0x2}, 0x0, 0x0, 0x7fffffff, 0x8, 0x562e, 0x10001, 0xffffffffffffffff, 0x3, 0x101, 0x2, 0xffffffffffffffff}) 16:05:18 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:05:18 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:18 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x0, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:18 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = syz_io_uring_setup(0x46ac, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r2, r3, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd=r1}, 0x0) r4 = syz_io_uring_setup(0x46ac, &(0x7f0000000080)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, &(0x7f00000a0000)=nil, &(0x7f00000b0000)=nil, &(0x7f0000000100)=0x0, &(0x7f0000000140)=0x0) syz_io_uring_submit(r5, r6, &(0x7f0000000040)=@IORING_OP_FADVISE={0x18, 0x0, 0x0, @fd=r4}, 0x0) r7 = io_uring_register$IORING_REGISTER_PERSONALITY(r0, 0x9, 0x0, 0x0) syz_io_uring_submit(r2, r6, &(0x7f0000000000)=@IORING_OP_MADVISE={0x19, 0x5, 0x0, 0x0, 0x0, &(0x7f0000ffc000/0x1000)=nil, 0x1000, 0x13, 0x0, {0x0, r7}}, 0x8) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:05:18 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x0) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:18 executing program 3: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget(0x0, 0x56) msgrcv(r0, &(0x7f0000000000)={0x0, ""/77}, 0x55, 0x1, 0x1800) 16:05:18 executing program 3: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget(0x0, 0x56) msgrcv(r0, &(0x7f0000000000)={0x0, ""/77}, 0x55, 0x1, 0x1800) 16:05:19 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x0, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:19 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:19 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:19 executing program 3: r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgrcv(0x0, &(0x7f00000013c0)=ANY=[@ANYBLOB="1cdd5adced483e043c2978348b36632337670d469d70a1e3506a9dd8cf6ccdb96b51203c35646d205d7f6a8f4feb5173c1ff0838f9dfd3524d980a6cef0125576d6f", @ANYRES32=r0, @ANYBLOB="fbe57e1aed69e22c029498a37a1b513b71b4449cc91c9b46f3212b1ef3e01af59793811c750ff20da729dc6d662c876b6251789c56188486cbf7674de053a3c0ce3529490bb71d9f653854a7a174cc534b3e18a524a0fc04b518a118067e57962c56e3fa817f219903a8161ce5d09b628adf1a5b980e0ea6a266bc8356b7f612d1c102f667fd638ebd52dbdad90d1be2ecfd1933aa8d46c1bf128f65cb1f1bb37dc66cddab213fd8603d0eaaeb5ba695d284cfbc0858c1e9b3ab09ab736753523c66091de3f79a80d17efcac05c67603a53a64805abfd8", @ANYRESDEC=0x0, @ANYRESOCT, @ANYRES64=0x0, @ANYRES16=r0], 0xfe, 0x1, 0x0) 16:05:19 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(r0, 0x0, 0x105402, 0x0) msgrcv(0xffffffffffffffff, &(0x7f0000000180)={0x0, ""/122}, 0x82, 0x2, 0x1800) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) ioctl$INCFS_IOC_GET_FILLED_BLOCKS(0xffffffffffffffff, 0x80286722, &(0x7f0000000080)={&(0x7f0000000000)=""/120, 0x78, 0xffff, 0x401}) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x40, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:05:19 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x0) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:19 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:05:19 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r0 = openat$binderfs_ctrl(0xffffffffffffff9c, &(0x7f0000000080)='./binderfs2/binder-control\x00', 0x2, 0x0) ioctl$BTRFS_IOC_GET_DEV_STATS(r0, 0xc4089434, &(0x7f0000000180)={0x0, 0xd147, 0x1, [0x7f, 0x9, 0x200, 0x0, 0x8], [0x1, 0x9, 0x3, 0x0, 0x9, 0xffff, 0x6, 0x4, 0x6a, 0x5a4, 0x96e, 0x4, 0x2, 0x101, 0x2, 0x8000, 0x1, 0x9, 0xd55c, 0x7fffffff, 0x0, 0x7, 0x1, 0x3ff, 0x1, 0x1, 0x7e, 0x6, 0x8, 0x8, 0x7f67, 0x1, 0x0, 0x40, 0x40, 0x10000, 0x6, 0x8000, 0x0, 0xfff, 0x0, 0x6d2, 0x6, 0x3, 0x3ff, 0x0, 0x4, 0x3ff, 0x2, 0x9f, 0x7, 0x2, 0x2, 0x0, 0x7, 0x7ff, 0x2, 0x7, 0x2, 0x1, 0x2, 0x0, 0x3, 0x8, 0x9, 0x7c, 0x7, 0x401, 0x401, 0x0, 0x80000000, 0x8, 0x800, 0x7ff, 0x60, 0x6, 0x3f, 0x7, 0x6, 0x4, 0x100, 0x7, 0xe6, 0x59a, 0x0, 0x8, 0x4, 0x8d, 0x6, 0x1ff, 0x7, 0x239e671c, 0x7, 0x401, 0x5, 0x49, 0x1000, 0x80, 0x6, 0x248, 0x0, 0x8, 0x3, 0x7f, 0x3, 0x3, 0x4, 0x20, 0x800, 0x7, 0x38000, 0x4, 0xffffffff, 0x1fc00000000, 0x8, 0x33, 0x404, 0x4cac, 0xffff, 0x1, 0xfc]}) r1 = msgget$private(0x0, 0x18) msgrcv(r1, &(0x7f0000000000)={0x0, ""/74}, 0x52, 0x1, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x1) 16:05:19 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x0, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:35 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) sendmsg$nl_generic(r0, &(0x7f0000000080)={&(0x7f0000000000)={0x10, 0x0, 0x0, 0x4000000}, 0xc, &(0x7f0000000040)={&(0x7f0000000180)={0x21c, 0x25, 0x2, 0x70bd25, 0x25dfdbfe, {0x1c}, [@nested={0x28, 0x5d, 0x0, 0x1, [@generic="3b44f75695dfa5c4171fe12401327926", @typed={0x14, 0xe, 0x0, 0x0, @ipv6=@empty}]}, @generic="0743098209cbec1405016af1e90c317311bafdf17f754bb86c7ad0bef4664b374d267c59add27de5bc479ef44117fa07d4aa24115817cc876e533af92e6e23", @generic="d943311f8ec97bf53e66dac35dd5f3545cd2eefdccbd07e125066237004a510bc33b3223829da8ae53da03b2c81657b55123abfd9e89bbbee757ca83829884c7008ad338709b5a9c7301a0326b63a49c42eabff37b341439a0256d1c163e2a2be8b1027bd0eb6cb9972a822d46ae6589df4ebc76166fcf74801070daa4317e3b65c02c5c9c61453d7e0959930302c727f2fcfc1b8acd41f4625f9ae2318b5107c99ff0fe6f0cf2582199d749a767cea7eaed170ef4e54971768f6e29fbcba2819ce35de8c668c827dd3ff579e58197d626f1bac65fbe7dedb92d086759bb5c0b3b9bde59d9f4e8d5e2606176d3bdf2f17673", @nested={0x4, 0x95}, @generic="cc2df1981a11b6443b20f336e2fa207de77a9b32ac92357e250bd971878b426dad212763603feab3bdaf663df6cb5131185534a8ea136c846318709ed3f27b2459e4880b52ec630ee40372a81fba135c7bf966a94c71a54a18832a5821c57e63d235bfd9e2d2f541b6bdfc29c39ee8beec8cc299ac7f34e5b5cd7a8a82444405b4454ed2feed4531f5601f273c7c204049bc7707fa9e1810d510a4984ea56fe226d4aeb851a3d6f73812"]}, 0x21c}, 0x1, 0x0, 0x0, 0x14040004}, 0x24001885) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r1, 0x400, 0x1) sendfile(r1, r0, &(0x7f00000000c0)=0x200, 0x0) 16:05:35 executing program 3: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) fork() msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:35 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) fork() msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:35 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, 0x0, 0x0, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:35 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:35 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgsnd(r1, &(0x7f0000000180)={0x2, "a1b1fc0a336b217fe12da02114cca0b286245a623e63d235f6ebfdd09386eedcf3d5a53c039302e67c604e587766bfdbd741b61af78f4f10d0825a417be50e9bd80a2c3d036925009603a5514187f4a2df5423c800af75c7b6a683b24c876c4b6fd0d57efb90366491c5179ea679e9b866a7c34436a46112f8794897b5e0564fc1afddac3d0ed1fc"}, 0x90, 0x800) r3 = msgget$private(0x0, 0x80) r4 = fork() msgctl$IPC_SET(r3, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgrcv(0xffffffffffffffff, &(0x7f0000001280)={0x0, ""/88}, 0x60, 0x2, 0x2000) msgrcv(r3, &(0x7f0000001300)=ANY=[@ANYBLOB="000000000000000051b758d1e30c793f000000000000a196b055a471f2a70e1c043e4a99793f0000000000000000000000921ed06eb70a98e12bbadded7400726856b9cc15f89dabc0ce1c6630516b185eba84c1a6cdc8d47e654266dee18f7444743d0500b3bd32435ce0b4b60d62f88095"], 0x30, 0x0, 0x1000) msgrcv(r1, &(0x7f0000000080)=ANY=[@ANYRESDEC=r0], 0xfe, 0x1, 0x2800) 16:05:35 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x0) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:35 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:35 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:35 executing program 7: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:05:35 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r3 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r4 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r5 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r4, r5, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r3, 0xd000943d, 0x0) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:35 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) fork() msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:50 executing program 0: msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="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"], 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:50 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) r7 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r7, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x0, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) fork() msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:50 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 1: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) r0 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r1 = msgget$private(0x0, 0x80) r2 = fork() r3 = msgget$private(0x0, 0x80) r4 = fork() msgctl$IPC_SET(r3, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r4}) msgrcv(r3, &(0x7f0000000000)={0x0, ""/131}, 0x8b, 0x3, 0x1000) msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) getsockopt$inet6_IPV6_IPSEC_POLICY(r0, 0x29, 0x22, &(0x7f0000000180)={{{@in=@multicast2, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@private1}}, &(0x7f00000000c0)=0xfc) msgctl$IPC_SET(r1, 0x1, &(0x7f00000004c0)={{0x0, r5, 0x0, 0x0, 0xee01, 0x0, 0x1800}, 0x0, 0x0, 0x200, 0xd72, 0x8, 0x100000000, 0x100000001, 0x18, 0x86c, 0x6, 0x0, 0xffffffffffffffff}) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:05:50 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x0, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, 0x0, 0x0, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:50 executing program 0: stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) getresuid(&(0x7f0000000680), &(0x7f00000006c0), &(0x7f0000000700)) syz_mount_image$iso9660(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0xfffffffffffffffe, 0x3, &(0x7f0000000540)=[{&(0x7f0000000080)="9edab547c0193dfb8ed0bdb441ef0bf7706b3280f3b0adf91e0b74eac333aefacc25e441a306eaf72f095fcad78c065c9718026ec930db1a0d0ba772314db226c4af9844067dae9c3102f4351a2ef218ceaa0436542458334d36f25fd4d3c0f70ddd91db6adcc40984d598dd1e2effad43e5a4abc52d0ee7f7ccc4233dd0179115c64fee5e1ebbe6143f070e33bd866bdea9e38ce73c42d1e79234bb0ee60a4aa52c18f263a7a09fd3b77d2cad5b370ffe08c54b4114518b96c523c17b7bd36f8130c17d", 0xc4, 0xff}, {&(0x7f0000000180)="8ddcfdc6bf970f7f5e9a6109e1205d237f0f0c7214f96a9dc09ea24edc529ca1ba69b75081d5e41272f81a6a32e8d61f6687bebc921308a6f785ef4f1cba6cb2d5c94412ef7eecb18964c4e1a647e12a215be2", 0x53, 0xe4}, {&(0x7f0000000480)="df40c4edeb5d0ab236b8c6f8a9331fe6ce88870ee21057f3df5f7fbfa02f29bb424f1d8de3ea3b689c2a02bc968e5646a06c817bdcf646a777c860ddbf01185c12c3dd0f46a2fced501e1a972794bb82c6b2b8780dae63f37ae739271126b008005881c6c32c91c3c68632afed6f2d88bc706fe5746d8215e936c8d1b7021cbd515ccdb5993bc7f1ebc2077dd0c29ba873525a95af9afe51ca467508e84af0a8894b01210eb7a011179f82ab814e947d88aa54da10126b562a13f557ed9ae6", 0xbf}], 0x20, &(0x7f0000000200)={[], [{@uid_gt}]}) msgrcv(0x0, &(0x7f0000000300)=ANY=[@ANYRES16, @ANYBLOB="2f38d755b590dfadd3f199a281f16a55dc158d3846a08310cad12719734cc2627759e488e0b7eddc800e805d23648d3620069ef26498c37cbe25afe96749dc9804a0cdd00f28a8c42ac4c861048f8fcfaf170fc5613ef532695142035d4f06c7c46cc320390e8fcba95593cee69e2cf7e6050bf4f490c9de9cb9950b8f1babe1eec66465b124d07604eeb99b", @ANYBLOB="207e1e7094575a4ba41fcab2a53825cda4dc34d2d35c5c993671d082e31bfde6c5c30b951f54d80f4b5a2fbcd2858e792faa2219d6f1c63554aab4dbdf25e181643e3f89a701e6e74653", @ANYBLOB="95ee8a6d1afb099f9adc69013ec642cc3eafbca7369e1cf386de60933bcda2956ec12d73a29f3484bed9d6bc848f5864545d486e3b4bf391f933d2074c7f11777e075debfc63", @ANYRESHEX=0x0, @ANYRESHEX, @ANYRES32=r0, @ANYRESHEX=r0, @ANYRES64], 0xfe, 0x1, 0x0) lsetxattr$trusted_overlay_origin(&(0x7f00000005c0)='./file0\x00', &(0x7f0000000600), &(0x7f0000000640), 0x2, 0x3) 16:05:50 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:05:50 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x0, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x0, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, 0x0, 0x0, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:05:50 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:05:50 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:05:50 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x0, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:05:50 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:05:50 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x0, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) [ 2345.323371] cgroup: fork rejected by pids controller in /syz1 16:06:05 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 16:06:05 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:06:05 executing program 1: msgsnd(0x0, &(0x7f0000000000)={0x1, "f0199da37f263497e0249dcacea6b2132c"}, 0x19, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) openat(r0, 0x0, 0x800, 0x40) read(0xffffffffffffffff, 0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) socketpair$nbd(0x1, 0x1, 0x0, &(0x7f0000000080)={0xffffffffffffffff, 0xffffffffffffffff}) r2 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r2, 0x400, 0x1) fcntl$getownex(r1, 0x10, 0x0) write$binfmt_aout(0xffffffffffffffff, 0x0, 0x820) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) perf_event_open(0x0, 0x0, 0x0, 0xffffffffffffffff, 0x0) 16:06:05 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget$private(0x0, 0x5) msgrcv(r0, &(0x7f0000000040)={0x0, ""/114}, 0x7a, 0x0, 0x800) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgrcv(r1, &(0x7f0000000000)={0x0, ""/9}, 0x11, 0x2, 0x800) 16:06:05 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:06:05 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:05 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x0, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:06:05 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:05 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r4 = msgget$private(0x0, 0x0) msgsnd(r4, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r3, @ANYRES32=r3]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r5, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2359.791913] loop1: detected capacity change from 0 to 256 [ 2359.805545] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:06:05 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 16:06:05 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:05 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x0, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) [ 2360.072226] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:06:20 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:20 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2}, 0x8, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:06:20 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:20 executing program 3: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) 16:06:20 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:06:20 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) msgsnd(0xffffffffffffffff, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000000000006f9e5c024bc6dc98bd03c75feef3a80ebf5bbafe4ac9011cf1686de2e4f4872274491e0b86bc"], 0x2b, 0x0) 16:06:20 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 16:06:20 executing program 1: r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) fsmount(0xffffffffffffffff, 0x1, 0x80) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r1, 0x400, 0x1) socketpair(0xf, 0x7, 0x7, &(0x7f0000000100)={0xffffffffffffffff}) dup3(0xffffffffffffffff, r2, 0x0) r3 = msgget$private(0x0, 0x101) msgsnd(r3, &(0x7f0000000080)={0x1, "58b7fbc943fe07afd0b043ab696580c69d489394f8a5da559c21506d9c483ff6ef99bf59b765978e2dac421a704724fa9aad1dea7f515d9bbf371b42222ea011663f9a730a2303a71f6f0394196c71bf21274d72a4b92505318e43e6a2c9ff820c917d37e2e091f3b624e052bd8f"}, 0x76, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) syz_io_uring_submit(0x0, 0x0, &(0x7f0000000000)=@IORING_OP_REMOVE_BUFFERS={0x1f, 0x5, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, {0x2}}, 0x80000001) 16:06:20 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:20 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2}, 0x8, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:06:20 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:21 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:21 executing program 1: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:21 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2}, 0x8, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:06:35 executing program 3: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) 16:06:35 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:35 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:35 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b96"}, 0x75, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:06:35 executing program 0: msgsnd(0x0, &(0x7f0000000040)=ANY=[@ANYBLOB="055cceee0000000012355e8d9d3f9fbffd91bcb50801"], 0x8, 0x0) r0 = msgget$private(0x0, 0x84) r1 = fork() msgctl$IPC_SET(r0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r1}) msgrcv(r0, &(0x7f0000000080)={0x0, ""/4096}, 0x1008, 0x2, 0x800) msgrcv(r0, &(0x7f0000002100)={0x0, ""/222}, 0xe6, 0x2, 0x3800) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f00000010c0)={0x0, ""/4096}, 0x1008, 0x0, 0x1000) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r4 = msgget$private(0x0, 0x80) r5 = fork() msgctl$IPC_SET(r4, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r5}) msgsnd(r4, &(0x7f0000002200)={0x347e53e4ff595588, "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"}, 0x1008, 0x800) 16:06:35 executing program 1: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() 16:06:35 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:35 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:35 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:35 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:35 executing program 1: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:06:35 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0)}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2389.748488] loop1: detected capacity change from 0 to 256 16:06:35 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b96"}, 0x75, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) [ 2389.764417] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:06:35 executing program 0: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgrcv(0x0, &(0x7f0000001280)=ANY=[@ANYBLOB="c8ffc83fb1b20542c11844762a5f1f9b761e96427fc37c8f129201d90449ff419e38cb9bcab3f80423ad3bc96644a238e372c6ee132e49d73c00ac8ea1428f046f1058679cea5cb46514ad3d02a6528c62751afba4cc6edbeb63a3e987843f3b51b2745c8a29a50a7f0930878563c9bc428baa3ed412e2eed969fac37354b144e7a522f75c34afaac37a465c19bc740fe9e328586224be6b75874ace89795694c0736859564e7fd6db76350c8c596719ff794b9d3d7445d881bc740ade4b2608caa15f563b26bd9721b4b0d345", @ANYRESDEC=r0, @ANYRES16, @ANYRES64], 0xfe, 0x1, 0x0) 16:06:35 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:35 executing program 5: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2390.206578] FAT-fs (loop1): Invalid FSINFO signature: 0x00000000, 0x00000000 (sector = 1) 16:06:49 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 5: r0 = gettid() prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX=r0], 0xfe, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000140)={0x2, "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"}, 0x1008, 0x0) ptrace$getregs(0xe, 0x0, 0x8db5, &(0x7f00000000c0)=""/89) msgsnd(0x0, &(0x7f0000001180)={0x3, "be41adb6c0ac52451c71595828951db97b16abeb8346dac3112fa3f88471498e8a5607d199fa8bc07691360bf8a5d4f400c1817d5a5e0162ede081377572cd94ae0bccdcc91c109151525eca187a264099b1f25ac2edb6a39ac5baedfdcaa0ffadb7d10599e2bb86f54c9946a3a046ea1d9bf32227987ac049b3e33467ae97bb1d89d23e58bc0f28777b201810d472ffaaa2d04c5d0931089363c7b353d986947e428a74984c63c1c029acfa441c1b7306d1c39318d66ce6103b9cd2e4836e"}, 0xc7, 0x0) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgsnd(r1, &(0x7f0000001280)={0x2, "f1fbc27c25d12c39c4480a5500c7cff6b9f403277aa92c4b5b176e02f546d4f50b401015cb5c4307f74289ef074ebd95f8944c4cc7904cbe66d1db8a7dc30bd09eb995ad0d88bdba5a25e522804333840c78a207b2bf50ccc3b8"}, 0x62, 0x0) r3 = getpgid(r0) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) prlimit64(r4, 0x9, &(0x7f0000001540)={0x6, 0x6}, &(0x7f0000001580)) fcntl$setlease(r5, 0x400, 0x1) clone3(&(0x7f00000014c0)={0x2a000, &(0x7f0000000000), &(0x7f0000001300), &(0x7f0000001340), {0x12}, &(0x7f0000001380)=""/17, 0x11, &(0x7f00000013c0)=""/172, &(0x7f0000001480)=[r2, r0, r3, r2, r2, r4], 0x6, {r5}}, 0x58) 16:06:49 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 1: ioctl$AUTOFS_DEV_IOCTL_READY(0xffffffffffffffff, 0xc0189376, &(0x7f0000000000)={{0x1, 0x1, 0x18, 0xffffffffffffffff, {0x80000001}}, './file0\x00'}) msgsnd(0x0, &(0x7f0000000140)={0x2}, 0x8, 0x0) r1 = msgget$private(0x0, 0x8) msgrcv(r1, &(0x7f0000000040)=ANY=[], 0xfe, 0x1, 0x0) r2 = msgget(0x3, 0x1) fstat(r0, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x0, 0x0}) getresgid(&(0x7f00000000c0), &(0x7f0000000100)=0x0, &(0x7f0000000180)) r5 = gettid() process_vm_readv(r5, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r5, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgctl$IPC_SET(r2, 0x1, &(0x7f00000001c0)={{0x2, r3, r4, 0xffffffffffffffff, 0xee01, 0xaf, 0x2}, 0x0, 0x0, 0x5, 0x780000, 0x3ff, 0x8, 0x200, 0xfffb, 0x5, 0xc10, r5, 0xffffffffffffffff}) 16:06:49 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b96"}, 0x75, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:06:49 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={0x0, 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 5: r0 = gettid() prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX=r0], 0xfe, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000140)={0x2, "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"}, 0x1008, 0x0) ptrace$getregs(0xe, 0x0, 0x8db5, &(0x7f00000000c0)=""/89) msgsnd(0x0, &(0x7f0000001180)={0x3, "be41adb6c0ac52451c71595828951db97b16abeb8346dac3112fa3f88471498e8a5607d199fa8bc07691360bf8a5d4f400c1817d5a5e0162ede081377572cd94ae0bccdcc91c109151525eca187a264099b1f25ac2edb6a39ac5baedfdcaa0ffadb7d10599e2bb86f54c9946a3a046ea1d9bf32227987ac049b3e33467ae97bb1d89d23e58bc0f28777b201810d472ffaaa2d04c5d0931089363c7b353d986947e428a74984c63c1c029acfa441c1b7306d1c39318d66ce6103b9cd2e4836e"}, 0xc7, 0x0) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgsnd(r1, &(0x7f0000001280)={0x2, "f1fbc27c25d12c39c4480a5500c7cff6b9f403277aa92c4b5b176e02f546d4f50b401015cb5c4307f74289ef074ebd95f8944c4cc7904cbe66d1db8a7dc30bd09eb995ad0d88bdba5a25e522804333840c78a207b2bf50ccc3b8"}, 0x62, 0x0) r3 = getpgid(r0) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) prlimit64(r4, 0x9, &(0x7f0000001540)={0x6, 0x6}, &(0x7f0000001580)) fcntl$setlease(r5, 0x400, 0x1) clone3(&(0x7f00000014c0)={0x2a000, &(0x7f0000000000), &(0x7f0000001300), &(0x7f0000001340), {0x12}, &(0x7f0000001380)=""/17, 0x11, &(0x7f00000013c0)=""/172, &(0x7f0000001480)=[r2, r0, r3, r2, r2, r4], 0x6, {r5}}, 0x58) 16:06:49 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) signalfd(r0, &(0x7f0000000000)={[0x7fff]}, 0x8) r1 = gettid() prlimit64(r1, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() 16:06:49 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, 0x0) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b"}, 0xab, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:06:49 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:06:49 executing program 0: msgsnd(0x0, &(0x7f0000000000)={0x0, "d3733b56a5cd37bb1a95a416b87e668ecfb595fbceccb28a55eb7a4a88042b95"}, 0x18bf72679e78aed1, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget(0x2, 0x40c) msgrcv(r0, &(0x7f0000000080)=ANY=[@ANYBLOB="00000000000000000000000000000000000000000000e50f49c6ffdfe1290eada22971c9aff1284da3637df0067795fb7905fe7fdddec1"], 0x16, 0x2, 0x1800) r1 = msgget$private(0x0, 0x80) msgctl$IPC_RMID(r1, 0x0) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgctl$IPC_RMID(r1, 0x0) 16:06:49 executing program 5: r0 = gettid() prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYRESDEC=0x0, @ANYRESOCT, @ANYRESHEX=r0], 0xfe, 0x1, 0x0) msgsnd(0x0, &(0x7f0000000140)={0x2, "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"}, 0x1008, 0x0) ptrace$getregs(0xe, 0x0, 0x8db5, &(0x7f00000000c0)=""/89) msgsnd(0x0, &(0x7f0000001180)={0x3, "be41adb6c0ac52451c71595828951db97b16abeb8346dac3112fa3f88471498e8a5607d199fa8bc07691360bf8a5d4f400c1817d5a5e0162ede081377572cd94ae0bccdcc91c109151525eca187a264099b1f25ac2edb6a39ac5baedfdcaa0ffadb7d10599e2bb86f54c9946a3a046ea1d9bf32227987ac049b3e33467ae97bb1d89d23e58bc0f28777b201810d472ffaaa2d04c5d0931089363c7b353d986947e428a74984c63c1c029acfa441c1b7306d1c39318d66ce6103b9cd2e4836e"}, 0xc7, 0x0) r1 = msgget$private(0x0, 0x80) r2 = fork() msgctl$IPC_SET(r1, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r2}) msgsnd(r1, &(0x7f0000001280)={0x2, "f1fbc27c25d12c39c4480a5500c7cff6b9f403277aa92c4b5b176e02f546d4f50b401015cb5c4307f74289ef074ebd95f8944c4cc7904cbe66d1db8a7dc30bd09eb995ad0d88bdba5a25e522804333840c78a207b2bf50ccc3b8"}, 0x62, 0x0) r3 = getpgid(r0) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) prlimit64(r4, 0x9, &(0x7f0000001540)={0x6, 0x6}, &(0x7f0000001580)) fcntl$setlease(r5, 0x400, 0x1) clone3(&(0x7f00000014c0)={0x2a000, &(0x7f0000000000), &(0x7f0000001300), &(0x7f0000001340), {0x12}, &(0x7f0000001380)=""/17, 0x11, &(0x7f00000013c0)=""/172, &(0x7f0000001480)=[r2, r0, r3, r2, r2, r4], 0x6, {r5}}, 0x58) 16:06:50 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) signalfd(r0, &(0x7f0000000000)={[0x7fff]}, 0x8) r1 = gettid() prlimit64(r1, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() 16:06:50 executing program 4: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) signalfd(r0, &(0x7f0000000000)={[0x7fff]}, 0x8) r1 = gettid() process_vm_readv(r1, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) fork() 16:07:04 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') msgget$private(0x0, 0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r5 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r5, &(0x7f0000000000), 0xfffffdef) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:07:04 executing program 7: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) read(0xffffffffffffffff, 0x0, 0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) signalfd(r0, &(0x7f0000000000)={[0x7fff]}, 0x8) r1 = gettid() prlimit64(r1, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() 16:07:04 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b"}, 0xab, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:04 executing program 3: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) r0 = msgget$private(0x0, 0x80) r1 = fork() msgctl$IPC_SET(r0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r1}) msgsnd(r0, &(0x7f0000000100)={0x1, "57ce2cfc13afd0888854e1"}, 0x13, 0x0) msgsnd(0x0, &(0x7f0000000180)={0x2, "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"}, 0x1008, 0x0) 16:07:04 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 0: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:04 executing program 1: msgsnd(0x0, &(0x7f0000000000)=ANY=[@ANYBLOB="0100a100730b98a7000400000000"], 0x8, 0x0) r0 = gettid() process_vm_readv(r0, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) syz_io_uring_setup(0x2ac, &(0x7f0000000180)={0x0, 0xebed, 0x4, 0x1, 0x18c}, &(0x7f0000ffd000/0x1000)=nil, &(0x7f0000ffc000/0x2000)=nil, &(0x7f0000000200), &(0x7f0000001280)) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r1, 0x400, 0x1) mmap$IORING_OFF_SQ_RING(&(0x7f0000000000/0x2000)=nil, 0x2000, 0x1000004, 0x110, r1, 0x0) stat(&(0x7f0000000140)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r2, 0x0) r3 = gettid() process_vm_readv(r3, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r3, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r4, 0x0) msgrcv(0x0, &(0x7f0000000080)=ANY=[@ANYRES16, @ANYRES64=r0, @ANYRES16=r2, @ANYRESHEX=r2, @ANYRES32=r3, @ANYRESDEC=r4], 0xfe, 0x1, 0x1000) 16:07:04 executing program 1: msgsnd(0x0, &(0x7f0000000140)=ANY=[], 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)=ANY=[@ANYRES64, @ANYRESDEC, @ANYBLOB="b93ac2f14762878269b191072c6ae592ba6ae7d774085c9f4e8c22b94a969194bf5b09cfa2260b8c16a24b79af9486fcaae66fa8aab867af07e11808fad2b618b8c462e68ab5a8062560b33280d3481fc826b8c0de0366f25b296a5b67f64f98fbb83a9fa99978ad66188520bd7585688d2dea126c6921509ecac3bd7bfe0bafe83cf29690ef0beb3eb5acf549e10715bd229e46673f494454c1b00a0d4530621d8d67c0df5566bfb13b612d98", @ANYRESDEC], 0xfe, 0x3, 0x0) msgrcv(0x0, &(0x7f0000000100)={0x0, ""/132}, 0x8c, 0x1, 0x2c00) r0 = msgget(0x1, 0x48) msgsnd(r0, &(0x7f00000001c0)={0x0, "9d09ebf59b96"}, 0xe, 0x800) 16:07:04 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 3: msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="d1848933a413a980"], 0x8, 0x0) r0 = msgget$private(0x0, 0x80) msgctl$IPC_SET(r0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6}) msgrcv(r0, &(0x7f0000000000)=ANY=[], 0xfe, 0x1, 0x3800) waitid(0x1, 0x0, &(0x7f00000000c0), 0x8, &(0x7f0000000180)) msgctl$MSG_INFO(r0, 0xc, &(0x7f0000000000)=""/140) 16:07:04 executing program 4: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:04 executing program 0: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b"}, 0xab, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:04 executing program 1: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:04 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:20 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 1) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:07:20 executing program 5: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:20 executing program 0: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:20 executing program 3: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x0, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:20 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab"}, 0xc6, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:20 executing program 1: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0x0, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:20 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) (fail_nth: 1) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:21 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2435.113438] FAULT_INJECTION: forcing a failure. [ 2435.113438] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2435.113472] CPU: 1 PID: 34285 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2435.113496] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2435.113510] Call Trace: [ 2435.113516] [ 2435.113524] dump_stack_lvl+0x8b/0xb3 [ 2435.113565] should_fail.cold+0x5/0xa [ 2435.113603] copy_page_to_iter+0x431/0x1190 [ 2435.113663] filemap_read+0x580/0xba0 [ 2435.113723] ? filemap_get_pages+0x1680/0x1680 [ 2435.113758] ? add_chain_block+0x46f/0x550 [ 2435.113815] ? lock_acquire+0x1b2/0x530 [ 2435.113852] generic_file_read_iter+0x3c9/0x530 [ 2435.113900] ext4_file_read_iter+0x184/0x400 [ 2435.113938] new_sync_read+0x38a/0x5f0 [ 2435.113965] ? __ia32_sys_llseek+0x380/0x380 [ 2435.114015] ? security_file_permission+0xb1/0xd0 [ 2435.114060] vfs_read+0x490/0x5d0 [ 2435.114093] ksys_read+0x127/0x250 [ 2435.114120] ? __ia32_sys_pwrite64+0x220/0x220 [ 2435.114151] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2435.114190] do_syscall_64+0x3b/0x90 [ 2435.114227] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2435.114253] RIP: 0033:0x7f0548198b19 [ 2435.114270] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2435.114290] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2435.114312] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2435.114327] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2435.114340] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2435.114353] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2435.114366] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2435.114406] 16:07:21 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) (fail_nth: 2) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:21 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:21 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 2) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:07:21 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab"}, 0xc6, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:21 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 1) 16:07:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) (fail_nth: 1) 16:07:21 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:21 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) (fail_nth: 1) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:07:21 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 1) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2435.386804] FAULT_INJECTION: forcing a failure. [ 2435.386804] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2435.387022] CPU: 0 PID: 34600 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2435.387043] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2435.387055] Call Trace: [ 2435.387059] [ 2435.387066] dump_stack_lvl+0x8b/0xb3 [ 2435.387100] should_fail.cold+0x5/0xa [ 2435.387130] copy_page_to_iter+0x431/0x1190 [ 2435.387177] filemap_read+0x580/0xba0 [ 2435.387225] ? filemap_get_pages+0x1680/0x1680 [ 2435.387253] ? add_chain_block+0x46f/0x550 [ 2435.387294] ? lock_acquire+0x1b2/0x530 16:07:21 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 2) [ 2435.387323] generic_file_read_iter+0x3c9/0x530 [ 2435.387361] ext4_file_read_iter+0x184/0x400 [ 2435.387391] new_sync_read+0x38a/0x5f0 [ 2435.387412] ? __ia32_sys_llseek+0x380/0x380 [ 2435.387453] ? security_file_permission+0xb1/0xd0 [ 2435.387488] vfs_read+0x490/0x5d0 [ 2435.387515] ksys_read+0x127/0x250 [ 2435.387535] ? __ia32_sys_pwrite64+0x220/0x220 [ 2435.387561] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2435.387592] do_syscall_64+0x3b/0x90 [ 2435.387622] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2435.387643] RIP: 0033:0x7f0548198b19 [ 2435.387656] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2435.387673] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2435.387690] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2435.387702] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2435.387713] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2435.387723] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2435.387733] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2435.387766] [ 2435.460560] FAULT_INJECTION: forcing a failure. [ 2435.460560] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2435.460587] CPU: 0 PID: 34646 Comm: syz-executor.5 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2435.460606] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2435.460617] Call Trace: [ 2435.460622] [ 2435.460628] dump_stack_lvl+0x8b/0xb3 [ 2435.460662] should_fail.cold+0x5/0xa 16:07:21 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2435.460690] _copy_to_user+0x2a/0x140 [ 2435.460711] store_msg+0x4a/0x140 [ 2435.460739] do_msg_fill+0xa0/0xf0 [ 2435.460764] do_msgrcv+0xa2b/0x11f0 [ 2435.460792] ? copy_compat_msqid_to_user+0x4b0/0x4b0 [ 2435.460827] ? __ia32_sys_msgsnd+0x130/0x130 [ 2435.460852] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2435.460882] ? fput+0x2a/0x50 [ 2435.460912] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2435.460942] do_syscall_64+0x3b/0x90 [ 2435.460970] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2435.460990] RIP: 0033:0x7efec89d3b19 [ 2435.461003] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2435.461019] RSP: 002b:00007efec5f49188 EFLAGS: 00000246 ORIG_RAX: 0000000000000046 [ 2435.461037] RAX: ffffffffffffffda RBX: 00007efec8ae6f60 RCX: 00007efec89d3b19 [ 2435.461049] RDX: 00000000000000fe RSI: 00000000200005c0 RDI: 0000000000000000 [ 2435.461059] RBP: 00007efec5f491d0 R08: 0000000000000800 R09: 0000000000000000 16:07:21 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 3) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2435.461070] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 2435.461080] R13: 00007ffdee4ed9ff R14: 00007efec5f49300 R15: 0000000000022000 [ 2435.461110] [ 2435.483343] FAULT_INJECTION: forcing a failure. [ 2435.483343] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2435.483369] CPU: 0 PID: 34656 Comm: syz-executor.1 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2435.483387] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 16:07:21 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) (fail_nth: 2) [ 2435.483399] Call Trace: [ 2435.483403] [ 2435.483409] dump_stack_lvl+0x8b/0xb3 [ 2435.483442] should_fail.cold+0x5/0xa [ 2435.483471] _copy_from_user+0x2a/0x170 [ 2435.483493] __copy_msghdr_from_user+0x91/0x4c0 [ 2435.483518] ? __ia32_sys_shutdown+0x70/0x70 16:07:21 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab"}, 0xc6, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) [ 2435.483541] ? __lock_acquire+0xbac/0x6120 [ 2435.483576] sendmsg_copy_msghdr+0xa1/0x160 [ 2435.483594] ? __ia32_sys_recvmsg+0x220/0x220 [ 2435.483611] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2435.483639] ? lock_release+0x3b2/0x750 [ 2435.483669] ___sys_sendmsg+0xc6/0x170 [ 2435.483688] ? sendmsg_copy_msghdr+0x160/0x160 [ 2435.483707] ? lock_release+0x3b2/0x750 [ 2435.483727] ? __fget_files+0x265/0x470 [ 2435.483755] ? lock_downgrade+0x6d0/0x6d0 [ 2435.483779] ? lock_release+0x3b2/0x750 [ 2435.483800] ? ksys_write+0x20c/0x250 [ 2435.483821] ? lock_downgrade+0x6d0/0x6d0 [ 2435.483849] ? __fget_files+0x287/0x470 [ 2435.483886] ? __fget_light+0xea/0x270 [ 2435.483914] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2435.483948] __x64_sys_sendmsg+0x132/0x220 [ 2435.483966] ? ___sys_sendmsg+0x170/0x170 [ 2435.483981] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2435.484012] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2435.484040] ? fput+0x2a/0x50 [ 2435.484068] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2435.484097] do_syscall_64+0x3b/0x90 [ 2435.484125] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2435.484145] RIP: 0033:0x7f8d6704fb19 [ 2435.484159] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2435.484175] RSP: 002b:00007f8d645c5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2435.484192] RAX: ffffffffffffffda RBX: 00007f8d67162f60 RCX: 00007f8d6704fb19 [ 2435.484204] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 [ 2435.484214] RBP: 00007f8d645c51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2435.484225] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2435.484258] R13: 00007ffc19222c5f R14: 00007f8d645c5300 R15: 0000000000022000 [ 2435.484288] [ 2435.651956] FAULT_INJECTION: forcing a failure. [ 2435.651956] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2435.651982] CPU: 0 PID: 34821 Comm: syz-executor.5 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2435.652001] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2435.652012] Call Trace: [ 2435.652017] [ 2435.652023] dump_stack_lvl+0x8b/0xb3 [ 2435.652058] should_fail.cold+0x5/0xa [ 2435.652087] _copy_to_user+0x2a/0x140 [ 2435.652109] simple_read_from_buffer+0xcc/0x160 [ 2435.652135] proc_fail_nth_read+0x194/0x220 [ 2435.652166] ? proc_exe_link+0x1d0/0x1d0 [ 2435.652193] ? security_file_permission+0xb1/0xd0 [ 2435.652223] ? proc_exe_link+0x1d0/0x1d0 [ 2435.652275] vfs_read+0x1ea/0x5d0 [ 2435.652302] ksys_read+0x127/0x250 [ 2435.652322] ? __ia32_sys_pwrite64+0x220/0x220 [ 2435.652346] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2435.652376] do_syscall_64+0x3b/0x90 [ 2435.652404] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2435.652425] RIP: 0033:0x7efec898669c [ 2435.652438] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2435.652454] RSP: 002b:00007efec5f49170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2435.652472] RAX: ffffffffffffffda RBX: 0000000000000008 RCX: 00007efec898669c [ 2435.652483] RDX: 000000000000000f RSI: 00007efec5f491e0 RDI: 0000000000000004 [ 2435.652493] RBP: 00007efec5f491d0 R08: 0000000000000000 R09: 0000000000000000 [ 2435.652503] R10: 0000000000000001 R11: 0000000000000246 R12: 0000000000000001 [ 2435.652513] R13: 00007ffdee4ed9ff R14: 00007efec5f49300 R15: 0000000000022000 [ 2435.652545] 16:07:36 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) (fail_nth: 2) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:07:36 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f0"}, 0xd4, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:36 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:07:36 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 3) 16:07:36 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:37 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 4) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:07:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 2) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2451.109439] FAULT_INJECTION: forcing a failure. [ 2451.109439] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2451.109460] CPU: 1 PID: 34939 Comm: syz-executor.1 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2451.109473] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2451.109481] Call Trace: [ 2451.109485] [ 2451.109489] dump_stack_lvl+0x8b/0xb3 [ 2451.109514] should_fail.cold+0x5/0xa [ 2451.109534] _copy_from_user+0x2a/0x170 16:07:37 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 4) [ 2451.109550] iovec_from_user+0x236/0x3c0 [ 2451.109567] ? _copy_from_user+0xf2/0x170 [ 2451.109582] __import_iovec+0x64/0x5c0 [ 2451.109607] import_iovec+0x83/0xb0 [ 2451.109628] sendmsg_copy_msghdr+0x12d/0x160 [ 2451.109642] ? __ia32_sys_recvmsg+0x220/0x220 [ 2451.109654] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2451.109674] ? lock_release+0x3b2/0x750 [ 2451.109695] ___sys_sendmsg+0xc6/0x170 [ 2451.109708] ? sendmsg_copy_msghdr+0x160/0x160 [ 2451.109720] ? lock_release+0x3b2/0x750 [ 2451.109735] ? __fget_files+0x265/0x470 [ 2451.109755] ? lock_downgrade+0x6d0/0x6d0 [ 2451.109771] ? lock_release+0x3b2/0x750 [ 2451.109786] ? ksys_write+0x20c/0x250 [ 2451.109801] ? lock_downgrade+0x6d0/0x6d0 [ 2451.109824] ? __fget_files+0x287/0x470 [ 2451.109850] ? __fget_light+0xea/0x270 [ 2451.109870] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2451.109894] __x64_sys_sendmsg+0x132/0x220 [ 2451.109906] ? ___sys_sendmsg+0x170/0x170 [ 2451.109916] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 16:07:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 3) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:07:37 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 5) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2451.109939] ? fput+0x2a/0x50 [ 2451.109959] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2451.109980] do_syscall_64+0x3b/0x90 [ 2451.110000] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2451.110015] RIP: 0033:0x7f8d6704fb19 [ 2451.110024] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2451.110035] RSP: 002b:00007f8d645c5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2451.110047] RAX: ffffffffffffffda RBX: 00007f8d67162f60 RCX: 00007f8d6704fb19 [ 2451.110055] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 [ 2451.110062] RBP: 00007f8d645c51d0 R08: 0000000000000000 R09: 0000000000000000 16:07:37 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 4) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2451.110068] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 16:07:37 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:07:37 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) (fail_nth: 3) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) [ 2451.110075] R13: 00007ffc19222c5f R14: 00007f8d645c5300 R15: 0000000000022000 [ 2451.110095] [ 2451.117509] FAULT_INJECTION: forcing a failure. [ 2451.117509] name fail_usercopy, interval 1, probability 0, space 0, times 0 16:07:37 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 6) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2451.117524] CPU: 1 PID: 34938 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2451.117536] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2451.117543] Call Trace: [ 2451.117546] [ 2451.117550] dump_stack_lvl+0x8b/0xb3 [ 2451.117569] should_fail.cold+0x5/0xa [ 2451.117588] copy_page_to_iter+0x431/0x1190 [ 2451.117620] filemap_read+0x580/0xba0 [ 2451.117652] ? filemap_get_pages+0x1680/0x1680 [ 2451.117670] ? add_chain_block+0x46f/0x550 [ 2451.117695] ? lock_acquire+0x1b2/0x530 16:07:37 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2451.117714] generic_file_read_iter+0x3c9/0x530 [ 2451.117739] ext4_file_read_iter+0x184/0x400 [ 2451.117759] new_sync_read+0x38a/0x5f0 [ 2451.117773] ? __ia32_sys_llseek+0x380/0x380 [ 2451.117799] ? security_file_permission+0xb1/0xd0 [ 2451.117823] vfs_read+0x490/0x5d0 16:07:37 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 5) 16:07:37 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x1000002ab) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2451.117844] ksys_read+0x127/0x250 [ 2451.117859] ? __ia32_sys_pwrite64+0x220/0x220 [ 2451.117876] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2451.117895] do_syscall_64+0x3b/0x90 [ 2451.117913] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2451.117926] RIP: 0033:0x7f0548198b19 [ 2451.117934] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2451.117945] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2451.117956] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2451.117964] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2451.117971] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2451.117978] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2451.117985] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2451.118006] [ 2451.310748] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2451.389129] FAULT_INJECTION: forcing a failure. [ 2451.389129] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2451.389151] CPU: 1 PID: 35047 Comm: syz-executor.0 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2451.389164] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2451.389172] Call Trace: [ 2451.389176] [ 2451.389181] dump_stack_lvl+0x8b/0xb3 [ 2451.389207] should_fail.cold+0x5/0xa [ 2451.389227] _copy_from_user+0x2a/0x170 [ 2451.389243] load_msg+0x19b/0x470 [ 2451.389265] do_msgsnd+0x182/0x1460 [ 2451.389282] ? find_held_lock+0x2c/0x110 [ 2451.389300] ? lock_release+0x3b2/0x750 [ 2451.389314] ? __might_fault+0xd1/0x170 [ 2451.389330] ? newque+0x670/0x670 [ 2451.389363] __x64_sys_msgsnd+0xe0/0x130 [ 2451.389382] do_syscall_64+0x3b/0x90 [ 2451.389403] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2451.389417] RIP: 0033:0x7ff182739b19 [ 2451.389426] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2451.389437] RSP: 002b:00007ff17fcaf188 EFLAGS: 00000246 ORIG_RAX: 0000000000000045 [ 2451.389450] RAX: ffffffffffffffda RBX: 00007ff18284cf60 RCX: 00007ff182739b19 [ 2451.389458] RDX: 0000000000000008 RSI: 0000000020000140 RDI: 0000000000000000 [ 2451.389465] RBP: 00007ff17fcaf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2451.389471] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2451.389478] R13: 00007ffe994433df R14: 00007ff17fcaf300 R15: 0000000000022000 [ 2451.389498] [ 2451.436762] FAULT_INJECTION: forcing a failure. [ 2451.436762] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2451.436797] CPU: 0 PID: 35050 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2451.436830] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2451.436849] Call Trace: [ 2451.436856] [ 2451.436865] dump_stack_lvl+0x8b/0xb3 [ 2451.436908] should_fail.cold+0x5/0xa [ 2451.436950] copy_page_to_iter+0x431/0x1190 [ 2451.437015] filemap_read+0x580/0xba0 [ 2451.437081] ? filemap_get_pages+0x1680/0x1680 [ 2451.437119] ? add_chain_block+0x46f/0x550 [ 2451.437176] ? lock_acquire+0x1b2/0x530 [ 2451.437217] generic_file_read_iter+0x3c9/0x530 [ 2451.437270] ext4_file_read_iter+0x184/0x400 [ 2451.437312] new_sync_read+0x38a/0x5f0 [ 2451.437342] ? __ia32_sys_llseek+0x380/0x380 [ 2451.437398] ? security_file_permission+0xb1/0xd0 [ 2451.437447] vfs_read+0x490/0x5d0 [ 2451.437485] ksys_read+0x127/0x250 [ 2451.437514] ? __ia32_sys_pwrite64+0x220/0x220 [ 2451.437549] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2451.437592] do_syscall_64+0x3b/0x90 [ 2451.437634] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2451.437663] RIP: 0033:0x7f0548198b19 [ 2451.437681] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2451.437704] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2451.437728] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2451.437745] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2451.437759] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2451.437774] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2451.437788] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2451.437834] 16:07:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 5) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:07:50 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f0"}, 0xd4, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:07:50 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x1000002dd) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:50 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 7) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:07:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) (fail_nth: 4) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:07:50 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:07:50 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 6) 16:07:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:07:50 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 7) 16:07:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) (fail_nth: 5) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:07:50 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 6) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:03 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) (fail_nth: 6) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:08:03 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:08:03 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 8) 16:08:03 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f0"}, 0xd4, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:08:03 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x1000002de) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:03 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 8) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2478.041774] FAULT_INJECTION: forcing a failure. [ 2478.041774] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2478.041944] CPU: 0 PID: 35598 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2478.041971] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2478.041987] Call Trace: [ 2478.041994] [ 2478.042003] dump_stack_lvl+0x8b/0xb3 [ 2478.042050] should_fail.cold+0x5/0xa [ 2478.042091] copy_page_to_iter+0x431/0x1190 [ 2478.042158] filemap_read+0x580/0xba0 [ 2478.042226] ? filemap_get_pages+0x1680/0x1680 [ 2478.042263] ? add_chain_block+0x46f/0x550 [ 2478.042324] ? lock_acquire+0x1b2/0x530 [ 2478.042364] generic_file_read_iter+0x3c9/0x530 [ 2478.042417] ext4_file_read_iter+0x184/0x400 [ 2478.042459] new_sync_read+0x38a/0x5f0 [ 2478.042488] ? __ia32_sys_llseek+0x380/0x380 [ 2478.042543] ? security_file_permission+0xb1/0xd0 [ 2478.042593] vfs_read+0x490/0x5d0 [ 2478.042632] ksys_read+0x127/0x250 [ 2478.042661] ? __ia32_sys_pwrite64+0x220/0x220 [ 2478.042696] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2478.042739] do_syscall_64+0x3b/0x90 [ 2478.042780] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2478.042808] RIP: 0033:0x7f0548198b19 [ 2478.042826] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.042848] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2478.042872] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2478.042888] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2478.042903] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.042917] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2478.042931] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2478.042975] [ 2478.108618] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2478.127408] FAULT_INJECTION: forcing a failure. [ 2478.127408] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2478.127439] CPU: 0 PID: 35607 Comm: syz-executor.0 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2478.127463] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 16:08:04 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 9) 16:08:04 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 9) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:08:04 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 7) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2478.127477] Call Trace: [ 2478.127483] [ 2478.127491] dump_stack_lvl+0x8b/0xb3 [ 2478.127532] should_fail.cold+0x5/0xa [ 2478.127568] _copy_to_user+0x2a/0x140 [ 2478.127596] simple_read_from_buffer+0xcc/0x160 [ 2478.127628] proc_fail_nth_read+0x194/0x220 [ 2478.127668] ? proc_exe_link+0x1d0/0x1d0 [ 2478.127702] ? security_file_permission+0xb1/0xd0 [ 2478.127740] ? proc_exe_link+0x1d0/0x1d0 [ 2478.127777] vfs_read+0x1ea/0x5d0 [ 2478.127817] ksys_read+0x127/0x250 [ 2478.127842] ? __ia32_sys_pwrite64+0x220/0x220 [ 2478.127873] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2478.127911] do_syscall_64+0x3b/0x90 [ 2478.127946] entry_SYSCALL_64_after_hwframe+0x46/0xb0 16:08:04 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) [ 2478.127971] RIP: 0033:0x7ff1826ec69c [ 2478.127987] Code: ec 28 48 89 54 24 18 48 89 74 24 10 89 7c 24 08 e8 f9 fc ff ff 48 8b 54 24 18 48 8b 74 24 10 41 89 c0 8b 7c 24 08 31 c0 0f 05 <48> 3d 00 f0 ff ff 77 34 44 89 c7 48 89 44 24 08 e8 2f fd ff ff 48 [ 2478.128007] RSP: 002b:00007ff17fcaf170 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2478.128028] RAX: ffffffffffffffda RBX: ffffffffffffffff RCX: 00007ff1826ec69c [ 2478.128043] RDX: 000000000000000f RSI: 00007ff17fcaf1e0 RDI: 0000000000000004 [ 2478.128056] RBP: 00007ff17fcaf1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.128069] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2478.128081] R13: 00007ffe994433df R14: 00007ff17fcaf300 R15: 0000000000022000 [ 2478.128121] 16:08:04 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2478.368454] FAULT_INJECTION: forcing a failure. [ 2478.368454] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2478.368487] CPU: 0 PID: 35869 Comm: syz-executor.1 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2478.368511] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2478.368525] Call Trace: [ 2478.368531] [ 2478.368538] dump_stack_lvl+0x8b/0xb3 [ 2478.368580] should_fail.cold+0x5/0xa [ 2478.368617] _copy_from_iter+0x37d/0x14d0 [ 2478.368668] ? _copy_from_iter_nocache+0x14a0/0x14a0 [ 2478.368700] ? rcu_read_lock_sched_held+0x3a/0x70 [ 2478.368735] ? memset+0x20/0x40 [ 2478.368761] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2478.368802] ? __virt_addr_valid+0xe9/0x350 [ 2478.368852] ? __sanitizer_cov_trace_const_cmp1+0x22/0x80 [ 2478.368887] ? __sanitizer_cov_trace_cmp8+0x1d/0x70 [ 2478.368921] ? __check_object_size+0x3ed/0x890 [ 2478.368965] netlink_sendmsg+0x874/0xe10 [ 2478.368998] ? netlink_unicast+0x800/0x800 [ 2478.369030] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2478.369069] ? netlink_unicast+0x800/0x800 [ 2478.369092] sock_sendmsg+0x150/0x190 [ 2478.369128] ____sys_sendmsg+0x70c/0x870 [ 2478.369165] ? kernel_sendmsg+0x50/0x50 [ 2478.369196] ? __ia32_sys_recvmsg+0x220/0x220 [ 2478.369218] ? lockdep_hardirqs_on_prepare+0x400/0x400 [ 2478.369254] ? lock_release+0x3b2/0x750 [ 2478.369293] ___sys_sendmsg+0xf3/0x170 [ 2478.369316] ? sendmsg_copy_msghdr+0x160/0x160 [ 2478.369339] ? lock_release+0x3b2/0x750 [ 2478.369370] ? lock_downgrade+0x6d0/0x6d0 [ 2478.369400] ? lock_release+0x3b2/0x750 [ 2478.369427] ? ksys_write+0x20c/0x250 [ 2478.369453] ? lock_downgrade+0x6d0/0x6d0 [ 2478.369489] ? __fget_files+0x287/0x470 [ 2478.369539] ? __fget_light+0xea/0x270 [ 2478.369575] ? __sanitizer_cov_trace_const_cmp8+0x1d/0x70 [ 2478.369618] __x64_sys_sendmsg+0x132/0x220 [ 2478.369640] ? ___sys_sendmsg+0x170/0x170 [ 2478.369658] ? __sanitizer_cov_trace_const_cmp4+0x1c/0x70 [ 2478.369714] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2478.369752] do_syscall_64+0x3b/0x90 [ 2478.369789] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2478.369814] RIP: 0033:0x7f8d6704fb19 [ 2478.369835] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2478.369855] RSP: 002b:00007f8d645c5188 EFLAGS: 00000246 ORIG_RAX: 000000000000002e [ 2478.369877] RAX: ffffffffffffffda RBX: 00007f8d67162f60 RCX: 00007f8d6704fb19 [ 2478.369891] RDX: 0000000000000000 RSI: 0000000020000340 RDI: 0000000000000003 [ 2478.369904] RBP: 00007f8d645c51d0 R08: 0000000000000000 R09: 0000000000000000 [ 2478.369916] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000001 [ 2478.369929] R13: 00007ffc19222c5f R14: 00007f8d645c5300 R15: 0000000000022000 [ 2478.369967] 16:08:19 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x1000002df) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:19 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d"}, 0xdb, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:08:19 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:19 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 10) 16:08:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:08:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x2}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:08:19 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 10) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:08:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 8) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:19 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 11) [ 2493.323455] FAULT_INJECTION: forcing a failure. [ 2493.323455] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2493.323490] CPU: 0 PID: 35994 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2493.323513] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2493.323527] Call Trace: [ 2493.323533] [ 2493.323541] dump_stack_lvl+0x8b/0xb3 [ 2493.323582] should_fail.cold+0x5/0xa [ 2493.323620] copy_page_to_iter+0x431/0x1190 [ 2493.323678] filemap_read+0x580/0xba0 [ 2493.323737] ? filemap_get_pages+0x1680/0x1680 [ 2493.323771] ? add_chain_block+0x46f/0x550 [ 2493.323832] ? lock_acquire+0x1b2/0x530 [ 2493.323868] generic_file_read_iter+0x3c9/0x530 [ 2493.323915] ext4_file_read_iter+0x184/0x400 [ 2493.323952] new_sync_read+0x38a/0x5f0 [ 2493.323979] ? __ia32_sys_llseek+0x380/0x380 [ 2493.324028] ? security_file_permission+0xb1/0xd0 [ 2493.324072] vfs_read+0x490/0x5d0 [ 2493.324105] ksys_read+0x127/0x250 [ 2493.324131] ? __ia32_sys_pwrite64+0x220/0x220 [ 2493.324162] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2493.324200] do_syscall_64+0x3b/0x90 [ 2493.324236] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2493.324262] RIP: 0033:0x7f0548198b19 [ 2493.324278] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2493.324298] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2493.324320] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2493.324334] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 16:08:19 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) [ 2493.324347] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 16:08:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 9) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:19 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2493.324360] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2493.324372] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2493.324412] 16:08:19 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 11) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:08:19 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x1000002e1) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2493.476569] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:08:19 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x80000}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:08:19 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 10) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:19 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d"}, 0xdb, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) [ 2493.620390] platform regulatory.0: _request_firmware_prepare: kmalloc(struct firmware) failed 16:08:35 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 12) 16:08:35 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 11) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:35 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d"}, 0xdb, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:08:35 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x2000, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:08:35 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000020000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) 16:08:35 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x1000002ef) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:35 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:35 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 12) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2509.949974] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2509.955663] FAULT_INJECTION: forcing a failure. [ 2509.955663] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2509.955697] CPU: 0 PID: 36794 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2509.955723] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2509.955739] Call Trace: [ 2509.955745] [ 2509.955753] dump_stack_lvl+0x8b/0xb3 [ 2509.955806] should_fail.cold+0x5/0xa [ 2509.955847] copy_page_to_iter+0x431/0x1190 [ 2509.955913] filemap_read+0x580/0xba0 [ 2509.955981] ? filemap_get_pages+0x1680/0x1680 [ 2509.956018] ? add_chain_block+0x46f/0x550 [ 2509.956075] ? lock_acquire+0x1b2/0x530 [ 2509.956114] generic_file_read_iter+0x3c9/0x530 [ 2509.956166] ext4_file_read_iter+0x184/0x400 [ 2509.956208] new_sync_read+0x38a/0x5f0 [ 2509.956238] ? __ia32_sys_llseek+0x380/0x380 [ 2509.956292] ? security_file_permission+0xb1/0xd0 [ 2509.956341] vfs_read+0x490/0x5d0 [ 2509.956378] ksys_read+0x127/0x250 [ 2509.956406] ? __ia32_sys_pwrite64+0x220/0x220 [ 2509.956441] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2509.956483] do_syscall_64+0x3b/0x90 [ 2509.956523] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2509.956551] RIP: 0033:0x7f0548198b19 [ 2509.956569] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2509.956591] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2509.956615] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2509.956631] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2509.956645] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2509.956659] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2509.956673] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2509.956717] 16:08:36 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 12) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:36 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 13) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:08:36 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x7ffffffff000, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:08:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x2) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:08:50 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170e"}, 0xde, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:08:50 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r12, 0x101}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {0x0, r13}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2524.767564] FAULT_INJECTION: forcing a failure. [ 2524.767564] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2524.767585] CPU: 0 PID: 37302 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2524.767598] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2524.767607] Call Trace: [ 2524.767611] [ 2524.767615] dump_stack_lvl+0x8b/0xb3 [ 2524.767642] should_fail.cold+0x5/0xa [ 2524.767663] copy_page_to_iter+0x431/0x1190 [ 2524.767698] filemap_read+0x580/0xba0 [ 2524.767732] ? filemap_get_pages+0x1680/0x1680 [ 2524.767751] ? add_chain_block+0x46f/0x550 [ 2524.767783] ? lock_acquire+0x1b2/0x530 [ 2524.767802] generic_file_read_iter+0x3c9/0x530 [ 2524.767828] ext4_file_read_iter+0x184/0x400 [ 2524.767850] new_sync_read+0x38a/0x5f0 [ 2524.767864] ? __ia32_sys_llseek+0x380/0x380 [ 2524.767891] ? security_file_permission+0xb1/0xd0 [ 2524.767916] vfs_read+0x490/0x5d0 [ 2524.767934] ksys_read+0x127/0x250 [ 2524.767948] ? __ia32_sys_pwrite64+0x220/0x220 [ 2524.767965] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2524.767986] do_syscall_64+0x3b/0x90 [ 2524.768007] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2524.768021] RIP: 0033:0x7f0548198b19 [ 2524.768031] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2524.768042] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2524.768053] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2524.768061] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2524.768069] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2524.768076] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2524.768082] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2524.768103] 16:08:50 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x0, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:08:50 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 13) 16:08:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:08:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 13) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:50 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 14) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2524.845291] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:08:50 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 15) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:08:50 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 14) 16:08:50 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:08:50 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 14) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:08:50 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x8) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:08:50 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 16) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:08:50 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170e"}, 0xde, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) [ 2525.072262] FAULT_INJECTION: forcing a failure. [ 2525.072262] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2525.072285] CPU: 0 PID: 37890 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2525.072298] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2525.072306] Call Trace: [ 2525.072310] [ 2525.072315] dump_stack_lvl+0x8b/0xb3 [ 2525.072340] should_fail.cold+0x5/0xa [ 2525.072360] copy_page_to_iter+0x431/0x1190 [ 2525.072392] filemap_read+0x580/0xba0 [ 2525.072425] ? filemap_get_pages+0x1680/0x1680 [ 2525.072443] ? add_chain_block+0x46f/0x550 [ 2525.072470] ? lock_acquire+0x1b2/0x530 [ 2525.072489] generic_file_read_iter+0x3c9/0x530 [ 2525.072514] ext4_file_read_iter+0x184/0x400 [ 2525.072535] new_sync_read+0x38a/0x5f0 [ 2525.072550] ? __ia32_sys_llseek+0x380/0x380 [ 2525.072576] ? security_file_permission+0xb1/0xd0 [ 2525.072600] vfs_read+0x490/0x5d0 [ 2525.072617] ksys_read+0x127/0x250 [ 2525.072631] ? __ia32_sys_pwrite64+0x220/0x220 [ 2525.072648] ? syscall_enter_from_user_mode+0x1d/0x50 16:08:51 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 15) [ 2525.072669] do_syscall_64+0x3b/0x90 16:08:51 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 15) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2525.072688] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2525.072702] RIP: 0033:0x7f0548198b19 [ 2525.072712] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2525.072723] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2525.072735] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2525.072743] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2525.072750] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2525.072757] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 16:08:51 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2525.072764] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2525.072788] [ 2525.161471] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:08:51 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:08:51 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 17) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:09:03 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 18) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:09:03 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0xff0f) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:09:03 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r2 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r4, 0x101}) r6 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r7 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r8 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r7, r8, 0x0, 0x10000027f) r9 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r2, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r9, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r6, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {0x0, r5}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}, {}, {}, {}, {r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r10}], 0x5, "af2f1a9317bc6f"}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(0xffffffffffffffff, 0xd000943d, &(0x7f0000051500)={0x7cbb, [], 0xff, "dda46f09132a67"}) ioctl$BTRFS_IOC_INO_LOOKUP_USER(r1, 0xd000943e, &(0x7f00000017c0)={0x0, 0x0, "8098b66b93f24683b2ba8974aec841d53485921866b65208b503bca25b5200706bd2abea3911d15f668fb8a9a9d29f9def683d53176b36ac58c14075851e097b16ee3c645310bc3ca25d4d7d506f94d62c20bd2517f64f5524845dfcd8114276a638e0e6e0eda892fce245596c60c6c70d2f3dca9dc3652c49c1f6db5901f8d7967ec80505be2a31e53eef5d3ae4e9cf24a1742b5ec38278176803f3405c7846c3e4ddae099c68758233b6a4867390923a1ef65e87b17a43186e1cc12576a1c02026f7cf930e1f5ee67ac8a48e49a4c2a0a71084f232240a3100462b3a0d1548606a582ed71caaeca21abefff2c94f0823ad1d3f8e44c7aaaa783c110a734dfc", "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"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:09:03 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 16) 16:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 16) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:03 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:09:03 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170e"}, 0xde, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) [ 2537.595531] FAULT_INJECTION: forcing a failure. [ 2537.595531] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2537.595553] CPU: 0 PID: 38159 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2537.595566] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2537.595575] Call Trace: [ 2537.595578] [ 2537.595583] dump_stack_lvl+0x8b/0xb3 [ 2537.595610] should_fail.cold+0x5/0xa [ 2537.595630] copy_page_to_iter+0x431/0x1190 [ 2537.595665] filemap_read+0x580/0xba0 [ 2537.595701] ? filemap_get_pages+0x1680/0x1680 [ 2537.595719] ? add_chain_block+0x46f/0x550 [ 2537.595747] ? lock_acquire+0x1b2/0x530 [ 2537.595767] generic_file_read_iter+0x3c9/0x530 [ 2537.595795] ext4_file_read_iter+0x184/0x400 [ 2537.595816] new_sync_read+0x38a/0x5f0 [ 2537.595831] ? __ia32_sys_llseek+0x380/0x380 [ 2537.595857] ? security_file_permission+0xb1/0xd0 [ 2537.595881] vfs_read+0x490/0x5d0 [ 2537.595899] ksys_read+0x127/0x250 [ 2537.595912] ? __ia32_sys_pwrite64+0x220/0x220 [ 2537.595929] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2537.595949] do_syscall_64+0x3b/0x90 [ 2537.595968] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2537.595983] RIP: 0033:0x7f0548198b19 [ 2537.595992] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2537.596003] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2537.596015] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2537.596023] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2537.596030] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2537.596037] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2537.596043] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2537.596065] 16:09:03 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 19) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 17) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:03 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 17) 16:09:03 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x80000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:03 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) [ 2537.852735] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:09:03 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7ce"}, 0xe0, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:09:03 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 18) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:03 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r0 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r2, 0x101}) r4 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r5 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r6 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r5, r6, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r0, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r4, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {0x0, r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r1}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r7}], 0x5, "af2f1a9317bc6f"}) close(0xffffffffffffffff) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2538.074573] platform regulatory.0: Direct firmware load for regulatory.db failed with error -12 16:09:17 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 20) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:09:17 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7ce"}, 0xe0, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:09:17 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:09:17 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:09:17 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 18) 16:09:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 19) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:17 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x1000000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:17 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r11, 0x101}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2551.847357] FAULT_INJECTION: forcing a failure. [ 2551.847357] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2551.847392] CPU: 1 PID: 38889 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2551.847416] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2551.847431] Call Trace: [ 2551.847437] [ 2551.847446] dump_stack_lvl+0x8b/0xb3 [ 2551.847488] should_fail.cold+0x5/0xa [ 2551.847527] copy_page_to_iter+0x431/0x1190 [ 2551.847586] filemap_read+0x580/0xba0 [ 2551.847647] ? filemap_get_pages+0x1680/0x1680 [ 2551.847682] ? add_chain_block+0x46f/0x550 [ 2551.847734] ? lock_acquire+0x1b2/0x530 [ 2551.847776] generic_file_read_iter+0x3c9/0x530 [ 2551.847830] ext4_file_read_iter+0x184/0x400 [ 2551.847858] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2551.847869] new_sync_read+0x38a/0x5f0 [ 2551.847897] ? __ia32_sys_llseek+0x380/0x380 [ 2551.847948] ? security_file_permission+0xb1/0xd0 [ 2551.847993] vfs_read+0x490/0x5d0 [ 2551.848027] ksys_read+0x127/0x250 [ 2551.848054] ? __ia32_sys_pwrite64+0x220/0x220 [ 2551.848086] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2551.848126] do_syscall_64+0x3b/0x90 [ 2551.848164] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2551.848190] RIP: 0033:0x7f0548198b19 [ 2551.848208] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2551.848228] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2551.848251] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 16:09:17 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 19) [ 2551.848265] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2551.848279] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2551.848292] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2551.848305] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2551.848346] 16:09:17 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 20) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:17 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x2000000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) [ 2552.001557] platform regulatory.0: loading /lib/firmware/updates/5.18.0-rc7-next-20220517/regulatory.db failed with error -12 16:09:17 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 21) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2552.013671] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:09:17 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7ce"}, 0xe0, 0x800) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:09:18 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 21) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:18 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) 16:09:18 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) [ 2552.189160] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:09:18 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0xff0f0000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:41 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 20) 16:09:41 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x8000000000000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:09:41 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) pwritev(r1, &(0x7f0000001a00)=[{&(0x7f0000000200)="74ae8eabb2d58609891d29066cce130699e5198396363d819bb4a352e6fe546b856ae3078549c44964c3aa853e92aea6717b90afafc6", 0x36}, {&(0x7f00000003c0)="6aa3a4508260287c3a4bcdb336db435187d8b261c438c751a84ac4ef70b72e5a09c6a368251776d18fd02a5de0a8bf8379170269adc882c4ab7c6d8bfdc9fb0ab85814db210607c93b35d43ec46362a50644d49c6ea6d2b59ecedc63bbb46d3db1898d771deb3404d94cc2f76664d43401acd71b3f58fae6d292d5a7792c310e58304b", 0x83}, {&(0x7f0000000480)="3b46a4a462441ea03e741bad0c2568f35796902acc8a05ce10124bb73f4afe4b2c161df3efa2d6c06f5eb1a8182a479eeeb3d7257f35e5a05d6decd62519d36c54bd325db56cda8b18fe022d", 0x4c}, {&(0x7f0000000240)="2d957f3de420b7dc23a5619ae47c87bda58add6ded", 0x15}, {&(0x7f0000000500)="7bf19f48c85a2190e2e7530a64f569a7d26e71b843a0c98638e3ca80075fd0b405e6b3799c11fb5a0a85bfa55f66ba5b5e645212283f848257937c9883314af64ba7a0ec588f1435c46148ac09da4ace055574f95a686a630a7910056d741c5554b4ed540f829878f9a0a6becab6421898ade7bd", 0x74}, {&(0x7f00000017c0)="bf0b7a1d6b06f23769a015df3a130a7d7c24c52c9cd202ba80bea97e87aa2470539c00760f3e1e52f48fb83b33207507f8c8e445e8e123d6a6ca5e260dd6a321dcbeb782aefd77c85466b6bcd2a286da55418e46704771f51edd66a6d67ac85f4baf0f8f3c982c8a5a7218b5cc01c0481210896fb4731bcd418fb71bef7df22f49b27dc8c1703292d2c4b8eeeca8d662d62c4d44229da6999e", 0x99}, {&(0x7f0000001880)="4f4226a583bdde4cea6c08ba9daeb41622e7a63502c1b94d3d428d42338eccf2daf4859977907e334d51113c4065e8817c19940e9888f179951c1a678877e75b443f3f8d69a04acb2cb48f240e1769191f7e99fb190a7bf5a1b41d3bddabd71f90f95f05f9a075dbf18b7eed1e5ce935bf704157d2875c23672ff663ef98fb1fa5dd7c3094f2f554fcc730e2633f4122968a13d238d660abf27dca1b1bef99719347fc970dff911f7bbc20e839096f646be17312c7ae7356508b61337cc2a367465f1aa4c589466892323fd75a", 0xcd}, {&(0x7f0000001980)="52ae9508b84695e2211140a5b68b8070e617f930944e572d1417b7396e7f03d2c9fca25b23a1480ef28efb3761e3d604a52bf3d4ae03426b3711407c5a0d885a76686c6d437271b6716aa1ee5bfb1ca0ec480079a2567eebabf2ae68ce4b8dcf1f65e09bc60c10bb", 0x68}, {&(0x7f0000000300)="ee60e6c68265f9a1", 0x8}], 0x9, 0xfffffc88, 0x4) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) perf_event_open$cgroup(&(0x7f0000001ac0)={0x5, 0x80, 0x4, 0x3, 0x63, 0x0, 0x0, 0x1f, 0x48a04, 0x2, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x3, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8000, 0x1, @perf_bp={&(0x7f0000000580), 0x3}, 0x8, 0x7, 0x0, 0x7, 0x1, 0x80000000, 0x6, 0x0, 0x5a2, 0x0, 0x22}, 0xffffffffffffffff, 0x10, 0xffffffffffffffff, 0xc) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:09:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 22) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:41 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 22) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:09:41 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x0) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:09:41 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) [ 2575.754007] platform regulatory.0: loading /lib/firmware/updates/5.18.0-rc7-next-20220517/regulatory.db failed with error -12 [ 2575.754259] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2575.765256] FAULT_INJECTION: forcing a failure. [ 2575.765256] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2575.765290] CPU: 1 PID: 39747 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2575.765316] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2575.765330] Call Trace: [ 2575.765337] [ 2575.765345] dump_stack_lvl+0x8b/0xb3 [ 2575.765389] should_fail.cold+0x5/0xa [ 2575.765429] copy_page_to_iter+0x431/0x1190 [ 2575.765492] filemap_read+0x580/0xba0 [ 2575.765556] ? filemap_get_pages+0x1680/0x1680 [ 2575.765592] ? add_chain_block+0x46f/0x550 [ 2575.765647] ? lock_acquire+0x1b2/0x530 [ 2575.765685] generic_file_read_iter+0x3c9/0x530 [ 2575.765736] ext4_file_read_iter+0x184/0x400 [ 2575.765782] new_sync_read+0x38a/0x5f0 [ 2575.765810] ? __ia32_sys_llseek+0x380/0x380 [ 2575.765864] ? security_file_permission+0xb1/0xd0 [ 2575.765911] vfs_read+0x490/0x5d0 [ 2575.765946] ksys_read+0x127/0x250 [ 2575.765974] ? __ia32_sys_pwrite64+0x220/0x220 [ 2575.766008] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2575.766049] do_syscall_64+0x3b/0x90 [ 2575.766089] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2575.766116] RIP: 0033:0x7f0548198b19 [ 2575.766134] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2575.766155] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2575.766178] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2575.766194] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2575.766208] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2575.766235] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2575.766248] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2575.766291] 16:09:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 23) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:41 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 21) 16:09:41 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 23) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:09:41 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) [ 2575.917559] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:09:41 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x100000000000000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:41 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 24) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2576.074045] platform regulatory.0: loading /lib/firmware/updates/5.18.0-rc7-next-20220517/regulatory.db failed with error -12 [ 2576.074486] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:09:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:09:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 25) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:57 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 22) 16:09:57 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x0) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:09:57 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 16:09:57 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) fcntl$setlease(0xffffffffffffffff, 0x400, 0x1) sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f00000003c0)={&(0x7f0000000200)={0x10, 0x0, 0x0, 0x800000}, 0xc, &(0x7f0000000300)={&(0x7f0000000240)={0x14, 0x0, 0x100, 0x70bd25, 0x25dfdbff}, 0x14}, 0x1, 0x0, 0x0, 0x52386406c3703494}, 0x1) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:09:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x200000000000000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:57 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 24) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2591.716600] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2591.760680] FAULT_INJECTION: forcing a failure. [ 2591.760680] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2591.760711] CPU: 1 PID: 40387 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2591.760734] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2591.760748] Call Trace: [ 2591.760754] [ 2591.760766] dump_stack_lvl+0x8b/0xb3 [ 2591.760805] should_fail.cold+0x5/0xa [ 2591.760842] copy_page_to_iter+0x431/0x1190 [ 2591.760900] filemap_read+0x580/0xba0 [ 2591.760958] ? filemap_get_pages+0x1680/0x1680 [ 2591.760992] ? add_chain_block+0x46f/0x550 [ 2591.761042] ? lock_acquire+0x1b2/0x530 16:09:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 26) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2591.761078] generic_file_read_iter+0x3c9/0x530 [ 2591.761125] ext4_file_read_iter+0x184/0x400 [ 2591.761162] new_sync_read+0x38a/0x5f0 [ 2591.761189] ? __ia32_sys_llseek+0x380/0x380 [ 2591.761238] ? security_file_permission+0xb1/0xd0 [ 2591.761282] vfs_read+0x490/0x5d0 [ 2591.761314] ksys_read+0x127/0x250 16:09:57 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 25) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2591.761340] ? __ia32_sys_pwrite64+0x220/0x220 [ 2591.761371] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2591.761409] do_syscall_64+0x3b/0x90 [ 2591.761446] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2591.761472] RIP: 0033:0x7f0548198b19 [ 2591.761488] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2591.761508] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2591.761529] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2591.761544] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2591.761557] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2591.761570] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2591.761582] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 16:09:57 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 23) 16:09:57 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) [ 2591.761621] [ 2591.945683] platform regulatory.0: loading /lib/firmware/updates/regulatory.db failed with error -12 [ 2591.958566] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:09:57 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:09:57 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0xff0f000000000000) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:09:57 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 27) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:09:57 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x0) msgsnd(0x0, &(0x7f0000000180)={0x0, "eabed75bfeaa2664edc8db877a79234bb53baee8fa829fd68e313db0b051df67d2de26fee0434f699c54356061ebce031f4e59db7a7ca34dc5096ea27977504c177178eae7658b61c23e8f046626c4b4dcd5201741e471590da1f16ee98e40fceec9089d75fa5f4baf582d03dafb5514e40e604c72fcbccccc502f9ce581063eb49e4574143636f3b50868d9d809a6669924c13e1b7a9254b3bfd3981127f0790c5f3125b6b90b4aa14a5dc40c47009d4879dc7e14554b45b1c7a70fa625eb929711a4e14a6dcc568b7dc30e74d3d95f"}, 0xd8, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:09:57 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x20ac0, 0x2) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) [ 2592.149808] platform regulatory.0: loading /lib/firmware/updates/regulatory.db failed with error -12 [ 2592.155911] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:10:14 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 26) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:10:14 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x0, 0x0) 16:10:14 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:10:14 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0}) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r11, 0x101}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {r11}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:10:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:10:14 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 24) 16:10:14 executing program 0: r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$AUTOFS_DEV_IOCTL_REQUESTER(0xffffffffffffffff, 0xc018937b, &(0x7f0000000780)={{0x1, 0x1, 0x18, r0}, './file0\x00'}) perf_event_open(&(0x7f0000000200)={0x0, 0x80, 0x3, 0x6, 0x78, 0x9, 0x0, 0x101, 0x200, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x2, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0xb654, 0x4, @perf_config_ext={0x2, 0xfffffffffffffffb}, 0x8840b, 0x9, 0x5e, 0x1, 0x7, 0x16a0, 0x8001, 0x0, 0x7ff, 0x0, 0x80000000}, 0xffffffffffffffff, 0x10, r1, 0x8) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)=ANY=[@ANYBLOB="0104000000000040"], 0x8, 0x0) creat(&(0x7f0000000800)='./file0\x00', 0xc0) write$binfmt_aout(r0, &(0x7f0000000300)=ANY=[@ANYBLOB="0b010009320200004c0300000900000033030000070000000000000000000000c0b330355a944bdcc2755b40c47046322d17cee4037b40e00998d3f8676eba739da85600"/1091], 0x443) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) perf_event_open$cgroup(&(0x7f0000000000)={0x2, 0x80, 0x0, 0xef, 0x3, 0x8, 0x0, 0x56, 0x4a000, 0x2, 0x0, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x1, 0x0, 0x0, 0x1, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x2, @perf_config_ext={0xfffffffffffffff8, 0x1}, 0x10c10, 0x5, 0xfff, 0x6, 0x24, 0x7, 0x3, 0x0, 0x9, 0x0, 0x8}, 0xffffffffffffffff, 0x1, r0, 0xe) sendmsg$IPVS_CMD_GET_CONFIG(0xffffffffffffffff, &(0x7f00000001c0)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x80000000}, 0xc, &(0x7f0000000180)={&(0x7f00000000c0)={0x80, 0x0, 0x631, 0x70bd2c, 0x25dfdbfd, {}, [@IPVS_CMD_ATTR_SERVICE={0x50, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xfffffff7}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0xb4}, @IPVS_SVC_ATTR_TIMEOUT={0x8, 0x8, 0x8}, @IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}, @IPVS_SVC_ATTR_ADDR={0x14, 0x3, @ipv6=@rand_addr=' \x01\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x00\x02'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x20, 0x38}}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x6, 0x4}}]}, @IPVS_CMD_ATTR_SERVICE={0xc, 0x1, 0x0, 0x1, [@IPVS_SVC_ATTR_PORT={0x6, 0x4, 0x4e22}]}, @IPVS_CMD_ATTR_TIMEOUT_TCP_FIN={0x8, 0x5, 0x89}, @IPVS_CMD_ATTR_TIMEOUT_UDP={0x8, 0x6, 0x4d}]}, 0x80}, 0x1, 0x0, 0x0, 0x20008000}, 0x4000004) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:10:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 28) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2608.604178] platform regulatory.0: loading /lib/firmware/updates/regulatory.db failed with error -12 [ 2608.604472] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 [ 2608.630177] FAULT_INJECTION: forcing a failure. [ 2608.630177] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2608.630211] CPU: 0 PID: 41272 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2608.630234] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2608.630248] Call Trace: [ 2608.630254] [ 2608.630262] dump_stack_lvl+0x8b/0xb3 [ 2608.630309] should_fail.cold+0x5/0xa [ 2608.630346] copy_page_to_iter+0x431/0x1190 [ 2608.630404] filemap_read+0x580/0xba0 [ 2608.630464] ? filemap_get_pages+0x1680/0x1680 [ 2608.630498] ? add_chain_block+0x46f/0x550 [ 2608.630548] ? lock_acquire+0x1b2/0x530 [ 2608.630584] generic_file_read_iter+0x3c9/0x530 [ 2608.630631] ext4_file_read_iter+0x184/0x400 [ 2608.630670] new_sync_read+0x38a/0x5f0 [ 2608.630721] ? __ia32_sys_llseek+0x380/0x380 [ 2608.630770] ? security_file_permission+0xb1/0xd0 [ 2608.630813] vfs_read+0x490/0x5d0 [ 2608.630852] ksys_read+0x127/0x250 [ 2608.630877] ? __ia32_sys_pwrite64+0x220/0x220 [ 2608.630908] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2608.630947] do_syscall_64+0x3b/0x90 [ 2608.630984] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2608.631009] RIP: 0033:0x7f0548198b19 [ 2608.631026] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 16:10:14 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 29) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:10:14 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 25) [ 2608.631046] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2608.631068] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2608.631082] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2608.631096] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2608.631108] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2608.631121] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2608.631160] 16:10:14 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 27) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) [ 2608.819533] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:10:14 executing program 0: chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b41, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r1, 0x0, 0x7ff, 0x8366}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000010000004bee336f", @ANYRES32, @ANYBLOB="ffffff7f000000002e2f66696c653000"]) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:10:14 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) 16:10:14 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 26) 16:10:28 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 27) 16:10:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 30) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) 16:10:28 executing program 2: msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) msgrcv(0x0, &(0x7f0000000000)={0x0, ""/61}, 0x45, 0x2, 0x1000) msgsnd(0x0, &(0x7f0000000280)={0x2, "fd78a9eec9ecdb85842ff7b1a14d2e02c6d35955c33f0c7efb5550dfe386a863ebff241ddba582c0b35b083c3e1c122e3ad946b2f8fa1a25f7595ed5c257d6abdddd39243476583fce50072c5d497d51d15ebf14a2f13e4b568764b80a36064298b21d943da27638979d153b9628203c333f9eb2be3c6fc469acc9a8a9b6064a85d6b3b9cde242f5902296ca860ecd1d8bed3794f438e79c0c1a5cf42b07702596db0b35cc0e4c0d835424f9f1cd713c84b112fb3706dc0c85b911a21fab3ac89e142be9825ad6b653cb23f01515cf7b32c63d6c170eb7cea7"}, 0xe1, 0x800) msgsnd(0x0, 0x0, 0x0, 0x0) stat(&(0x7f0000000240)='./file0\x00', &(0x7f0000000280)={0x0, 0x0, 0x0, 0x0, 0x0}) setresuid(0x0, r0, 0x0) recvmsg$unix(0xffffffffffffffff, &(0x7f0000000540)={&(0x7f0000000080), 0x6e, &(0x7f0000000100)=[{&(0x7f0000000380)=""/68, 0x44}, {&(0x7f0000000400)=""/170, 0xaa}], 0x2, &(0x7f00000004c0)=[@rights={{0x34, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}, @cred={{0x1c, 0x1, 0x2, {0x0, 0x0, 0x0}}}, @rights={{0x20, 0x1, 0x1, [0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff, 0xffffffffffffffff]}}], 0x78}, 0x42) r2 = msgget$private(0x0, 0x80) r3 = fork() msgctl$IPC_SET(r2, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r3}) msgrcv(r2, &(0x7f0000001280)={0x0, ""/170}, 0xb2, 0x3, 0x2000) r4 = gettid() process_vm_readv(r4, &(0x7f00000000c0)=[{&(0x7f0000000280)=""/4078, 0xfee}, {&(0x7f0000000000)=""/123, 0x7b}, {&(0x7f0000000100)=""/57, 0x39}], 0x3, &(0x7f0000000240)=[{&(0x7f0000012940)=""/102400, 0xffffff76}], 0x1, 0x0) prlimit64(r4, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) r5 = getpgrp(0xffffffffffffffff) msgctl$IPC_SET(0x0, 0x1, &(0x7f0000000580)={{0x0, r0, 0xee00, 0xee00, r1, 0x0, 0x1}, 0x0, 0x0, 0x9, 0x6, 0xffffffff, 0x7fffffff, 0xfffffffffffffcb4, 0x800, 0x7, 0x81, r4, r5}) r6 = fork() msgctl$IPC_SET(0x0, 0x1, &(0x7f0000003440)={{0x3, 0xffffffffffffffff, 0x0, 0x0, 0xee01, 0xe, 0x2}, 0x0, 0x0, 0x9, 0x0, 0x6, 0xfffffffffffffff9, 0x0, 0x0, 0x400, 0x6, r6}) msgctl$IPC_RMID(0x0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[], 0xfe, 0x1, 0x0) 16:10:28 executing program 7: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x4b, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:10:28 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 28) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:10:28 executing program 5: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="000000000000000001000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000f051e4d4e58f788700000000000000005eef00000000000000000000000000000000000000000000000000000000000000000000000000000000e80000000000000000000000081e1002c7adf43a58000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000965b0589b06a0f789ca83ab271ff8cd1fb5bdd1e9fb4da4c5f19c3590704615b66079d21d4259c9b7ae7af928851c3410019efd83f30a7e7e09ecaa9ac36fb51f9a7f7bc99f5b85632ef0c930d7127534407973df896e08d4411a869890000000000000000000000000000000000000000000000004ead5ae458f0ecf72002f508954a00"], 0xfe, 0x1, 0x800) 16:10:28 executing program 6: chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r0 = syz_open_dev$tty20(0xc, 0x4, 0x1) ioctl$TCXONC(r0, 0x4b41, 0x0) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = openat(0xffffffffffffffff, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$F2FS_IOC_MOVE_RANGE(0xffffffffffffffff, 0xc020f509, &(0x7f0000000080)={r1, 0x0, 0x7ff, 0x8366}) pipe2(&(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}, 0x4800) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000040)=ANY=[@ANYBLOB="01000000010000004bee336f", @ANYRES32, @ANYBLOB="ffffff7f000000002e2f66696c653000"]) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) 16:10:28 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) r0 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r0, 0x400, 0x1) r1 = openat(0xffffffffffffff9c, &(0x7f0000000040)='./file0\x00', 0x26e1, 0x0) fcntl$setlease(r1, 0x400, 0x1) ioctl$BINDER_WRITE_READ(r0, 0xc0306201, &(0x7f0000000240)={0x7c, 0x0, &(0x7f00000001c0)=[@increfs={0x40046304, 0x1}, @free_buffer, @transaction={0x40406300, {0x1, 0x0, 0x0, 0x0, 0x31, 0x0, 0x0, 0x68, 0x18, &(0x7f00000000c0)={@ptr={0x70742a85, 0x0, &(0x7f0000000000)=""/86, 0x56, 0x2, 0x6}, @ptr={0x70742a85, 0x0, &(0x7f0000000080)=""/46, 0x2e, 0x2, 0x40}, @fd={0x66642a85, 0x0, r1}}, &(0x7f0000000180)={0x0, 0x28, 0x50}}}, @request_death, @release={0x40046306, 0x1}, @free_buffer], 0x4d, 0x0, &(0x7f0000000300)="78b729ed6e1301c98a6918019f3bcd2c202b5e5cbcf9f9d05c1c1d9374cd716bf1cc659fee3268c20e9c233fc9a7c74a97e61a60b7c25cd01a5e1657d74bcdff37792982a9732ede8c7174365b"}) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) [ 2622.819924] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:10:28 executing program 6: syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r0 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r1 = dup(0xffffffffffffffff) pidfd_getfd(r1, r0, 0x0) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) [ 2622.855152] FAULT_INJECTION: forcing a failure. [ 2622.855152] name fail_usercopy, interval 1, probability 0, space 0, times 0 [ 2622.855186] CPU: 1 PID: 41882 Comm: syz-executor.4 Not tainted 5.18.0-rc7-next-20220517 #1 [ 2622.855210] Hardware name: QEMU Standard PC (i440FX + PIIX, 1996), BIOS rel-1.14.0-0-g155821a1990b-prebuilt.qemu.org 04/01/2014 [ 2622.855225] Call Trace: [ 2622.855231] [ 2622.855240] dump_stack_lvl+0x8b/0xb3 [ 2622.855281] should_fail.cold+0x5/0xa [ 2622.855324] copy_page_to_iter+0x431/0x1190 [ 2622.855382] filemap_read+0x580/0xba0 [ 2622.855440] ? filemap_get_pages+0x1680/0x1680 [ 2622.855474] ? add_chain_block+0x46f/0x550 [ 2622.855525] ? lock_acquire+0x1b2/0x530 [ 2622.855560] generic_file_read_iter+0x3c9/0x530 [ 2622.855607] ext4_file_read_iter+0x184/0x400 [ 2622.855648] new_sync_read+0x38a/0x5f0 [ 2622.855674] ? __ia32_sys_llseek+0x380/0x380 [ 2622.855724] ? security_file_permission+0xb1/0xd0 [ 2622.855767] vfs_read+0x490/0x5d0 [ 2622.855805] ksys_read+0x127/0x250 [ 2622.855831] ? __ia32_sys_pwrite64+0x220/0x220 16:10:28 executing program 1: r0 = socket$nl_generic(0x10, 0x3, 0x10) r1 = syz_genetlink_get_family_id$nl80211(&(0x7f0000000200), 0xffffffffffffffff) socket$nl_generic(0x10, 0x3, 0x10) socket$nl_generic(0x10, 0x3, 0x10) ioctl$sock_SIOCGIFINDEX_80211(0xffffffffffffffff, 0x8933, 0x0) sendmsg$NL80211_CMD_TRIGGER_SCAN(r0, &(0x7f0000000340)={0x0, 0x0, &(0x7f0000000300)={&(0x7f0000000080)={0x1c, r1, 0x5, 0x70bd26, 0x0, {{0x7e}, {@val={0x8}, @void}}}, 0x1c}}, 0x0) (fail_nth: 31) sendmsg$NL80211_CMD_SET_TID_CONFIG(0xffffffffffffffff, 0x0, 0x0) [ 2622.855862] ? syscall_enter_from_user_mode+0x1d/0x50 [ 2622.855900] do_syscall_64+0x3b/0x90 [ 2622.855937] entry_SYSCALL_64_after_hwframe+0x46/0xb0 [ 2622.855962] RIP: 0033:0x7f0548198b19 [ 2622.855979] Code: ff ff c3 66 2e 0f 1f 84 00 00 00 00 00 0f 1f 40 00 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 73 01 c3 48 c7 c1 bc ff ff ff f7 d8 64 89 01 48 [ 2622.855999] RSP: 002b:00007f054570e188 EFLAGS: 00000246 ORIG_RAX: 0000000000000000 [ 2622.856021] RAX: ffffffffffffffda RBX: 00007f05482abf60 RCX: 00007f0548198b19 [ 2622.856035] RDX: 00000000fffffdef RSI: 0000000020000000 RDI: 0000000000000004 [ 2622.856048] RBP: 00007f054570e1d0 R08: 0000000000000000 R09: 0000000000000000 [ 2622.856061] R10: 0000000000000000 R11: 0000000000000246 R12: 0000000000000002 [ 2622.856073] R13: 00007ffc2614b8cf R14: 00007f054570e300 R15: 0000000000022000 [ 2622.856113] 16:10:28 executing program 3: prlimit64(0x0, 0x6, &(0x7f0000000040)={0x0, 0x8001}, 0x0) fork() (fail_nth: 28) 16:10:28 executing program 6: prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(0xffffffffffffffff, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r8}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, 0x0, 0x101042, 0x0) [ 2622.974096] platform regulatory.0: Direct firmware load for regulatory.db failed with error -2 16:10:28 executing program 7: prlimit64(0x0, 0x8, &(0x7f0000000200)={0x8, 0x1}, &(0x7f0000000240)) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) r0 = perf_event_open(&(0x7f0000000040)={0x0, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f0000000340)={0x3, 0x80, 0x81, 0x0, 0x6, 0x3, 0x0, 0x4, 0x0, 0x6, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x1, 0x0, 0x1, 0x1, 0x3, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x1, 0x0, 0x1, 0x1, 0x1, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x1, 0x1, 0x0, 0x8, 0x0, @perf_bp={&(0x7f00000000c0), 0xd}, 0xc8c6ea48e431b6a9, 0x400, 0x2, 0x7, 0x0, 0x9, 0xefc, 0x0, 0x8ff}, 0x0, 0x9, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000300)='net/ip_vs\x00') r1 = socket$netlink(0x10, 0x3, 0x0) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) prctl$PR_TASK_PERF_EVENTS_ENABLE(0x20) ioctl$BTRFS_IOC_INO_LOOKUP(0xffffffffffffffff, 0xd0009412, &(0x7f00000007c0)={r3, 0x101}) r5 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r6 = openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x1010c2, 0x0) r7 = openat$procfs(0xffffffffffffff9c, &(0x7f0000000040)='/proc/timer_list\x00', 0x0, 0x0) sendfile(r6, r7, 0x0, 0x10000027f) r8 = dup2(0xffffffffffffffff, 0xffffffffffffffff) ioctl$sock_SIOCGIFCONF(r1, 0x8912, &(0x7f0000000000)=@buf={0xba, &(0x7f0000000140)="2bdbcb98b1248a8cd698930f4757f317f5c2cf0297e0c258567a537be0e73dbb0e4c1d23ff08a9f33fa7ee4622c97c0efadb9693ed20bb7008caa628b0edbf8a98ce040416b003533e7066ec7b38cc167e760ee597c5e1cfc6146bd6dd5a56b448fb4863b4eb16dffc89138402937c66c756992a5c58a492b19aa40e15c5c4aa2e26373c24c890a8264ab4320aa8fedac3c81d5f0da82b8ef57650cb054768be00d637fd0d8c1a7b55120eff7a376706be7ee408e8fd6d178351"}) ioctl$PERF_EVENT_IOC_DISABLE(r8, 0x2401, 0x42c2d1d3) ioctl$BTRFS_IOC_GET_SUBVOL_INFO(0xffffffffffffffff, 0x81f8943c, &(0x7f00000005c0)={0x0, ""/256, 0x0, 0x0}) ioctl$BTRFS_IOC_GET_SUBVOL_ROOTREF(r5, 0xd000943d, &(0x7f0000070280)={0x0, [{}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {0x0, r4}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r2}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}, {}, {}, {}, {r3}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {0x0, r10}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {}, {r9}], 0x5, "af2f1a9317bc6f"}) close(r0) openat(0xffffffffffffff9c, &(0x7f0000000100)='./file1\x00', 0x101042, 0x0) 16:10:28 executing program 4: r0 = syz_mount_image$vfat(&(0x7f0000000000), &(0x7f0000000040)='./file0\x00', 0x0, 0x2, &(0x7f0000000200)=[{&(0x7f0000010000)="601c6d6b646f736689254300080120000400004000f8000020004000030000000000000001", 0x25}, {0x0, 0x0, 0x10000}], 0x0, &(0x7f0000011200)=ANY=[]) r1 = perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x100, 0x1, @perf_bp={&(0x7f0000000040), 0xf}, 0x400, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) r2 = dup(0xffffffffffffffff) r3 = pidfd_getfd(r2, r1, 0x0) ioctl$AUTOFS_DEV_IOCTL_PROTOSUBVER(r2, 0xc0189373, &(0x7f0000000240)={{0x1, 0x1, 0x18, r0, {0xc0e}}, './file1\x00'}) chdir(&(0x7f0000000140)='./file0\x00') r5 = msgget$private(0x0, 0x0) msgsnd(r5, &(0x7f0000000140)={0x1}, 0x8, 0x0) ioctl$AUTOFS_DEV_IOCTL_SETPIPEFD(0xffffffffffffffff, 0xc0189378, &(0x7f0000000400)=ANY=[@ANYBLOB="010000000100000010cb0000", @ANYRES16=r0, @ANYRES16=0x0, @ANYRES64, @ANYRES64=r4, @ANYRES32=r3, @ANYRES32=r4]) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) r6 = openat(0xffffffffffffff9c, &(0x7f0000000080)='/proc/self/exe\x00', 0x0, 0x0) read(r6, &(0x7f0000000000), 0xfffffdef) (fail_nth: 29) msgrcv(0x0, &(0x7f00000005c0)=ANY=[@ANYBLOB="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"], 0xfe, 0x1, 0x800) openat(0xffffffffffffff9c, &(0x7f0000000000)='./file1\x00', 0x4042, 0x0) 16:10:28 executing program 0: perf_event_open(&(0x7f0000000280)={0x1, 0x80, 0x0, 0x0, 0x0, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, @perf_bp={0x0}, 0x0, 0x0, 0x800000}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) chdir(0x0) msgsnd(0x0, &(0x7f0000000140)={0x1}, 0x8, 0x0) read(0xffffffffffffffff, &(0x7f0000000000), 0xfffffdef) openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) fcntl$getownex(0xffffffffffffffff, 0x10, 0x0) openat(0xffffffffffffff9c, 0x0, 0x4042, 0x0) [ 2635.362837] kmemleak: 1 new suspected memory leaks (see /sys/kernel/debug/kmemleak) BUG: memory leak unreferenced object 0xffff88800da5f000 (size 256): comm "syz-executor.3", pid 41849, jiffies 4297289608 (age 20.807s) hex dump (first 32 bytes): 01 00 00 00 00 00 00 00 00 00 00 00 05 00 00 00 ................ 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 ................ backtrace: [<0000000003ce3322>] mas_alloc_nodes+0x36e/0x6a0 [<000000004013286e>] mas_node_count+0x101/0x130 [<000000004c528673>] mas_expected_entries+0x10c/0x1b0 [<000000003dd30394>] dup_mmap+0x433/0xf80 [<000000009639263e>] dup_mm+0x91/0x370 [<000000003ae3539b>] copy_process+0x6bbf/0x6d80 [<0000000079b63638>] kernel_clone+0xe7/0xa60 [<00000000440cac17>] __do_sys_fork+0x7c/0xb0 [<000000001ab27aa6>] do_syscall_64+0x3b/0x90 [<00000000c4c8019e>] entry_SYSCALL_64_after_hwframe+0x46/0xb0 BUG: leak checking failed VM DIAGNOSIS: 16:10:49 Registers: info registers vcpu 0 RAX=ffffffff841bcef0 RBX=ffffffff850328c0 RCX=ffffffff8419f371 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000000 RSP=ffffffff85007e18 R8 =0000000000000001 R9 =ffff88806ce38c13 R10=ffffed100d9c7182 R11=0000000000000001 R12=fffffbfff0a06518 R13=ffffffff858ef710 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff841bcefb RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806ce00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe0000003000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000001000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=00007fff87b7ef78 CR3=0000000019b9a000 CR4=00350ef0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001fa0 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM02=0000000000000000 0000000000000000 0000000000000000 416a0bad00000000 YMM03=0000000000000000 0000000000000000 0000ff0000000000 0000000000000000 YMM04=0000000000000000 0000000000000000 732f6c61636f6c2f 7273752f3d485441 YMM05=0000000000000000 0000000000000000 622f6c61636f6c2f 7273752f3a6e6962 YMM06=0000000000000000 0000000000000000 73752f3a6e696273 2f7273752f3a6e69 YMM07=0000000000000000 0000000000000000 6e69622f3a6e6962 732f3a6e69622f72 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000 info registers vcpu 1 RAX=ffffffff841bcef0 RBX=ffff888008248000 RCX=ffffffff8419f371 RDX=0000000000000000 RSI=0000000000000001 RDI=0000000000000000 RBP=0000000000000001 RSP=ffff888008257e58 R8 =0000000000000001 R9 =ffff88806cf38c13 R10=ffffed100d9e7182 R11=0000000000000001 R12=ffffed1001049000 R13=ffffffff858ef710 R14=0000000000000000 R15=dffffc0000000000 RIP=ffffffff841bcefb RFL=00000202 [-------] CPL=0 II=0 A20=1 SMM=0 HLT=1 ES =0000 0000000000000000 00000000 00000000 CS =0010 0000000000000000 ffffffff 00a09b00 DPL=0 CS64 [-RA] SS =0018 0000000000000000 ffffffff 00c09300 DPL=0 DS [-WA] DS =0000 0000000000000000 00000000 00000000 FS =0000 0000000000000000 00000000 00000000 GS =0000 ffff88806cf00000 00000000 00000000 LDT=0000 fffffe0000000000 00000000 00000000 TR =0040 fffffe000004a000 00004087 00008b00 DPL=0 TSS64-busy GDT= fffffe0000048000 0000007f IDT= fffffe0000000000 00000fff CR0=80050033 CR2=000055a71403ecc8 CR3=0000000016f40000 CR4=00350ee0 DR0=0000000000000000 DR1=0000000000000000 DR2=0000000000000000 DR3=0000000000000000 DR6=00000000ffff4ff0 DR7=0000000000000400 EFER=0000000000000d01 FCW=037f FSW=0000 [ST=0] FTW=00 MXCSR=00001f80 FPR0=0000000000000000 0000 FPR1=0000000000000000 0000 FPR2=0000000000000000 0000 FPR3=0000000000000000 0000 FPR4=0000000000000000 0000 FPR5=0000000000000000 0000 FPR6=0000000000000000 0000 FPR7=0000000000000000 0000 YMM00=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM01=0000000000000000 0000000000000000 656a626f20646563 6e6572656665726e YMM02=0000000000000000 0000000000000000 2936353220657a69 7328203030306635 YMM03=0000000000000000 0000000000000000 3420646970202c22 332e726f74756365 YMM04=0000000000000000 0000000000000000 2e2e2e2e2e2e2e20 2030302030302030 YMM05=0000000000000000 0000000000000000 2030302030302030 3020303020303020 YMM06=0000000000000000 0000000000000000 6574796220323320 7473726966282070 YMM07=0000000000000000 0000000000000000 3032206567612820 3830363938323739 YMM08=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM09=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM10=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM11=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM12=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM13=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM14=0000000000000000 0000000000000000 0000000000000000 0000000000000000 YMM15=0000000000000000 0000000000000000 0000000000000000 0000000000000000