0x14, r5, &(0x7f0000000440), 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:16 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:16 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:16 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) [ 506.293436] IPVS: ftp: loaded support on port[0] = 21 23:40:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='b%rfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:16 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:16 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:16 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:16 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:16 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='bXrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:17 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:17 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:17 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 507.183794] IPVS: ftp: loaded support on port[0] = 21 23:40:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:17 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:17 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:17 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, 0x0) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:17 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:17 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btr/s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 507.729765] IPVS: ftp: loaded support on port[0] = 21 23:40:18 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, 0x0, 0x0) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:18 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf#\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:18 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, 0x0) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:18 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, 0x0, 0x0) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:18 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 508.334083] IPVS: ftp: loaded support on port[0] = 21 23:40:18 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:18 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf%\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:18 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, 0x0, 0x0) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:18 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:18 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:19 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, 0x0) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf*\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 509.013023] IPVS: ftp: loaded support on port[0] = 21 23:40:19 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:19 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(0xffffffffffffffff, 0x4010ae67, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:19 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x0, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:19 executing program 4: bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:19 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf+\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:19 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:19 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:19 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={0x0, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:19 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x0, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:19 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 509.682559] IPVS: ftp: loaded support on port[0] = 21 23:40:20 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf-\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:20 executing program 4: perf_event_open(0x0, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:20 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x0, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf.\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:20 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:20 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={0x0, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 510.469352] IPVS: ftp: loaded support on port[0] = 21 23:40:20 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0x0, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrf0\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:20 executing program 4: perf_event_open(&(0x7f0000000180)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:40:21 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x10, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfX\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:21 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0x0, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:21 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={0x0, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:40:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfc\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 511.181408] IPVS: ftp: loaded support on port[0] = 21 23:40:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:21 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0x0, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:40:21 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfd\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:21 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:21 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 23:40:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:22 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:22 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x0, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:22 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) [ 512.028425] IPVS: ftp: loaded support on port[0] = 21 23:40:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfi\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:22 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:22 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 23:40:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:22 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x0, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:22 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:40:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfl\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:22 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:40:22 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:22 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, 0xffffffffffffffff, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:22 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x0, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:22 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:23 executing program 0: r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) [ 512.797337] IPVS: ftp: loaded support on port[0] = 21 23:40:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:23 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x0, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, 0x0, 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:23 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:23 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfp\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 513.459782] IPVS: ftp: loaded support on port[0] = 21 23:40:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, 0x0, 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:23 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x0, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:23 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfu\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:24 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:40:24 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:24 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r5, 0x2}) sendfile(0xffffffffffffffff, r4, 0x0, 0x10013c93a) 23:40:24 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x0, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 514.076768] IPVS: ftp: loaded support on port[0] = 21 23:40:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfx\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, 0x0, 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:24 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:40:24 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x0, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:24 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:24 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VM(0xffffffffffffffff, 0xae01, 0x0) r1 = ioctl$KVM_CREATE_VCPU(r0, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r0, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r1, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:40:24 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x0, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:24 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r5, 0x2}) sendfile(0xffffffffffffffff, r4, 0x0, 0x10013c93a) 23:40:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x02', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:24 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x0, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 514.718904] IPVS: ftp: loaded support on port[0] = 21 23:40:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x03', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:25 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:25 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x0, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x04', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:25 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r5, 0x2}) sendfile(0xffffffffffffffff, r4, 0x0, 0x10013c93a) 23:40:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:25 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x05', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:25 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:25 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 515.867797] IPVS: ftp: loaded support on port[0] = 21 23:40:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x06', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:26 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:26 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, 0x0) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\a', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:26 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r4 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r5, 0x2}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x10013c93a) 23:40:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:26 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:26 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\t', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:26 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x0, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 516.927138] IPVS: ftp: loaded support on port[0] = 21 23:40:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\n', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:27 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:27 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:27 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r4 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r5, 0x2}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x10013c93a) 23:40:27 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:27 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\v', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, 0x0) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:27 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)) setsockopt$SO_ATTACH_FILTER(0xffffffffffffffff, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 517.950887] IPVS: ftp: loaded support on port[0] = 21 23:40:28 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(0x0, 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\f', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:28 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) 23:40:28 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:28 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r4 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r5, 0x2}) sendfile(r4, 0xffffffffffffffff, 0x0, 0x10013c93a) 23:40:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:28 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x0e', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:28 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:28 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) [ 518.929746] IPVS: ftp: loaded support on port[0] = 21 23:40:29 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, 0x0) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:29 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(0x0) memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:29 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, 0x0, 0x0) 23:40:29 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x0) 23:40:29 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x0, 0x0}, 0x10) 23:40:29 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsH', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:29 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(0x0) memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 519.808988] IPVS: ftp: loaded support on port[0] = 21 23:40:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsL', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:30 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:30 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(0x0) memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:30 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x0, 0x0}, 0x10) 23:40:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:32 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x0) 23:40:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsh', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:32 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:32 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(0x0, 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:32 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x0, 0x0}, 0x10) 23:40:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsl', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 522.659724] IPVS: ftp: loaded support on port[0] = 21 23:40:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:32 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(0x0, 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, 0x0, &(0x7f0000000080)) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:33 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0), 0x10) 23:40:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfst', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:33 executing program 1: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x0) 23:40:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x0, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfsz', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:33 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(0x0, 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 523.317438] IPVS: ftp: loaded support on port[0] = 21 23:40:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:33 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x0, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:33 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0), 0x10) 23:40:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:33 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x0) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:34 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:40:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x0, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:34 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x0) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:34 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0), 0x10) 23:40:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6f"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:34 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:34 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x0) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:34 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe719"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:34 executing program 5: r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_timedreceive(r0, &(0x7f0000000380)=""/204, 0x1e2, 0x20000000, 0x0) 23:40:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:37 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:40:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe719"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:37 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:37 executing program 5: r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_timedreceive(r0, &(0x7f0000000380)=""/204, 0x1e2, 0x20000000, 0x0) 23:40:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:37 executing program 5: r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_timedreceive(r0, &(0x7f0000000380)=""/204, 0x1e2, 0x20000000, 0x0) 23:40:37 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:37 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:37 executing program 5: r0 = mq_open(&(0x7f0000000000)='md5sumeth1wlan0{cgroupmime_type@\x00', 0x6e93ebbbcc0884f2, 0x0, &(0x7f0000000080)={0x0, 0x2, 0x5}) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) mq_timedsend(r0, 0x0, 0x0, 0x0, 0x0) socketpair$unix(0x1, 0x1, 0x0, &(0x7f0000000000)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) mq_timedreceive(r0, &(0x7f0000000380)=""/204, 0x1e2, 0x20000000, 0x0) 23:40:37 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe719"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:37 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:40 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x0]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:40 executing program 5: perf_event_open(&(0x7f0000000580)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x50d, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xe9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$DRM_IOCTL_ADD_MAP(0xffffffffffffffff, 0xc0286415, &(0x7f00000003c0)={&(0x7f0000ffe000/0x2000)=nil, 0x5ad, 0x0, 0x0, &(0x7f0000ffe000/0x2000)=nil, 0x4c}) r0 = syz_init_net_socket$bt_l2cap(0x1f, 0x1, 0x3) clone(0x2102001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) connect$bt_l2cap(r0, &(0x7f0000000000)={0x1f, 0x307, {0x0, 0x0, 0x0, 0x0, 0x6}}, 0xe) accept(r0, 0x0, 0x0) r1 = openat(0xffffffffffffff9c, 0x0, 0x0, 0x0) inotify_add_watch(r1, &(0x7f0000000080)='./file1\x00', 0x0) 23:40:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe71918"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:40 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:40 executing program 5: sendmsg$NET_DM_CMD_START(0xffffffffffffffff, &(0x7f0000000580)={0x0, 0x0, &(0x7f0000000540)={&(0x7f0000000500)={0x14}, 0x14}, 0x1, 0x0, 0x0, 0x4}, 0x0) r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000480)='/dev/ptmx\x00', 0x100000000201, 0x0) write$binfmt_aout(r0, &(0x7f00000000c0)=ANY=[], 0xffffff78) ioctl$TCSETS(r0, 0x40045431, &(0x7f0000000180)) r1 = syz_open_pts(r0, 0x0) read(r1, &(0x7f0000000000)=""/195, 0xc3) 23:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x0]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:40 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe71918"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:40 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:40 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:40 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x0]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:41 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:40:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe71918"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:41 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:41 executing program 5: socketpair$unix(0x1, 0x5, 0x0, &(0x7f00000002c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = socket$inet_tcp(0x2, 0x1, 0x0) setsockopt$inet_tcp_int(r1, 0x6, 0x10000000013, &(0x7f0000d06000)=0x1, 0x4) connect$inet(r1, &(0x7f0000000340)={0x2, 0x0, @dev={0xac, 0x14, 0x14, 0x1d}}, 0x10) setsockopt$sock_linger(r1, 0x1, 0xd, &(0x7f0000000140)={0x1, 0x10001}, 0x8) close(r1) 23:40:41 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x1c', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:41 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:41 executing program 5: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) mmap(&(0x7f0000000000/0xe7e000)=nil, 0xe7e000, 0x0, 0x31, 0xffffffffffffffff, 0x0) 23:40:41 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:41 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 531.671278] audit: type=1326 audit(1551829241.835:51): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25495 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:40:42 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) gettid() 23:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs ', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:40:42 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:42 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:40:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x0f', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:42 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:42 executing program 5: r0 = openat$tun(0xffffffffffffff9c, &(0x7f00000000c0)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r0, 0x400454ca, &(0x7f0000000240)={'s\x00\x00\xe2\x00\x00\x01\x00\x01\x00\x00\x00\x00\x00\xe3n', 0x9d01}) ioctl$TUNSETOFFLOAD(r0, 0x400454d0, 0x4) 23:40:42 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:42 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:40:43 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) gettid() 23:40:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:43 executing program 5: seccomp(0x1, 0x0, &(0x7f0000001980)={0x1, &(0x7f0000000580)=[{0x6, 0x0, 0x0, 0xfffffffffffffffe}]}) remap_file_pages(&(0x7f0000ffc000/0x2000)=nil, 0x2000, 0x0, 0x0, 0x0) 23:40:43 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:43 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) [ 532.967239] ptrace attach of ""[25532] was attempted by "/root/syz-executor.1"[25533] [ 533.043717] audit: type=1326 audit(1551829243.205:52): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25570 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:40:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x10', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:43 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(0xffffffffffffffff, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:43 executing program 0: mkdir(&(0x7f0000000240)='./file0\x00', 0x0) mount(0x0, &(0x7f0000000200)='./file0\x00', &(0x7f00000000c0)='proc\x00', 0x0, 0x0) mount(0x0, &(0x7f0000000180)='./file0\x00', 0x0, 0x8100021, 0x0) 23:40:43 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, 0x0, 0x40004) 23:40:43 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:43 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(0xffffffffffffffff, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 533.834230] audit: type=1326 audit(1551829244.005:53): auid=4294967295 uid=0 gid=0 ses=4294967295 subj=_ pid=25570 comm="syz-executor.5" exe="/root/syz-executor.5" sig=31 arch=c000003e syscall=228 compat=0 ip=0x45ad8a code=0xffff0000 23:40:44 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) gettid() 23:40:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000000280)) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:44 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(0x0) sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:44 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, 0x0, 0x40004) 23:40:44 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 533.938916] ptrace attach of ""[25592] was attempted by "/root/syz-executor.1"[25593] 23:40:44 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1000000000016) 23:40:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000000280)) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:44 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, 0x0, 0x40004) 23:40:44 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x0, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:44 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:44 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:44 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, 0x0, &(0x7f0000000280)) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:44 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:45 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, 0x0, 0x40004) 23:40:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:45 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1000000000016) 23:40:45 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 535.221482] ptrace attach of ""[25667] was attempted by "/root/syz-executor.1"[25668] 23:40:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:45 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4}, &(0x7f0000000080)=0x8) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:45 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:45 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) tkill(0x0, 0x1000000000016) 23:40:45 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={0x0, 0x0, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:45 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:45 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={0x0, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r1 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r1, &(0x7f0000000180), 0x12) 23:40:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:46 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:46 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x0) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:46 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1}, &(0x7f0000000280)=0x8) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:46 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(0x0, 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:46 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(0x0) memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:46 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:46 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:46 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 536.523206] ptrace attach of ""[25745] was attempted by "/root/syz-executor.1"[25746] 23:40:46 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1}, &(0x7f0000000280)=0x8) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:47 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x0, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3aa43"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1}, &(0x7f0000000280)=0x8) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:47 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0), 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xc0', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:47 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x1e, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5"}, &(0x7f0000000280)=0x26) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:47 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:47 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:47 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:47 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:47 executing program 5: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r5, 0x2}) sendfile(0xffffffffffffffff, r4, 0x0, 0x10013c93a) 23:40:47 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x1e, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5"}, &(0x7f0000000280)=0x26) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(0xffffffffffffffff, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 537.868968] IPVS: ftp: loaded support on port[0] = 21 23:40:48 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x1e, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5"}, &(0x7f0000000280)=0x26) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:48 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, 0x0, 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:48 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, 0x0, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:48 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:48 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfo\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:48 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:48 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x2d, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844"}, &(0x7f0000000280)=0x35) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:48 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, 0x0) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:49 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:49 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0), 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 538.963109] IPVS: ftp: loaded support on port[0] = 21 23:40:49 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x0, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x2d, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844"}, &(0x7f0000000280)=0x35) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:49 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0), 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x2d, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844"}, &(0x7f0000000280)=0x35) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:49 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:49 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x35, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be8"}, &(0x7f0000000280)=0x3d) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:49 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0), 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:51 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, 0x0) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:51 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, 0x0, 0x0) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:51 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x35, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be8"}, &(0x7f0000000280)=0x3d) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:51 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 541.600924] IPVS: ftp: loaded support on port[0] = 21 23:40:51 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:51 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x35, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be8"}, &(0x7f0000000280)=0x3d) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:51 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:51 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btr.s\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:52 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:52 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x39, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043"}, &(0x7f0000000280)=0x41) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:52 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, 0x0) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:52 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(0xffffffffffffffff, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 542.410413] IPVS: ftp: loaded support on port[0] = 21 23:40:54 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) ioctl$PERF_EVENT_IOC_ENABLE(0xffffffffffffffff, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:54 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[]}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x39, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043"}, &(0x7f0000000280)=0x41) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:54 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:54 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:54 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, 0x0) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 544.576069] IPVS: ftp: loaded support on port[0] = 21 23:40:54 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x39, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043"}, &(0x7f0000000280)=0x41) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:55 executing program 5: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:40:55 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:55 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:55 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:55 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(0xffffffffffffffff, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) [ 545.279907] IPVS: ftp: loaded support on port[0] = 21 23:40:57 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:57 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:57 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:57 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:57 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:57 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:58 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:58 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:58 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:58 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:59 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:59 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3b, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d"}, &(0x7f0000000280)=0x43) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:59 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_current(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:59 executing program 5: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={0x0, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:40:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:59 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_current(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:40:59 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 549.346796] IPVS: ftp: loaded support on port[0] = 21 23:40:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:59 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:40:59 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:40:59 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:40:59 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(0xffffffffffffffff, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:00 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={0x0, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:41:00 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:00 executing program 5: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, 0x0, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 550.049233] IPVS: ftp: loaded support on port[0] = 21 23:41:00 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:00 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:02 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) write$apparmor_current(0xffffffffffffffff, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:41:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:02 executing program 5: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:41:02 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:02 executing program 0: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(r2, 0xc0086420, 0x0) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={0x0, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) [ 552.550873] IPVS: ftp: loaded support on port[0] = 21 [ 552.642414] IPVS: ftp: loaded support on port[0] = 21 23:41:02 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:02 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, 0x0, 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:03 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:03 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:03 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) 23:41:03 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:05 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:05 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:05 executing program 5: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:41:05 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) 23:41:05 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:05 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce14"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 555.617769] IPVS: ftp: loaded support on port[0] = 21 23:41:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(0xffffffffffffffff, &(0x7f0000000180), 0x12) 23:41:06 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:06 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 23:41:06 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:06 executing program 5: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:41:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:06 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:06 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 23:41:06 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:06 executing program 0: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 556.690859] IPVS: ftp: loaded support on port[0] = 21 23:41:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:07 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz'}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:07 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:07 executing program 4: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, 0x0, 0x0) 23:41:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:07 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:07 executing program 4: r0 = syz_open_dev$swradio(0x0, 0xffffffffffffffff, 0x2) ioctl$VIDIOC_CREATE_BUFS(r0, 0xc100565c, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={&(0x7f0000abe000)}, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x401}, 0x0, 0x0, 0xffffffffffffffff, 0x0) perf_event_open(&(0x7f000001d000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8000, 0x0, 0x0, 0x2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$SNDRV_CTL_IOCTL_TLV_COMMAND(0xffffffffffffffff, 0xc008551c, &(0x7f0000000b40)=ANY=[]) unshare(0x40000000) fcntl$setstatus(0xffffffffffffffff, 0x4, 0x0) getpeername$packet(r0, 0x0, 0x0) ioctl$sock_FIOGETOWN(0xffffffffffffffff, 0x8903, &(0x7f0000000900)=0x0) getsockopt$inet6_dccp_int(0xffffffffffffffff, 0x21, 0x0, 0x0, &(0x7f0000000300)=0x2f3) fcntl$lock(0xffffffffffffffff, 0x26, &(0x7f0000000200)) ioctl$FITRIM(0xffffffffffffffff, 0xc0185879, 0x0) lstat(&(0x7f0000000100)='./bus\x00', &(0x7f0000000180)) sendmsg$netlink(0xffffffffffffffff, &(0x7f0000028fc8)={0x0, 0x0, &(0x7f0000019000), 0x0, &(0x7f0000000040)}, 0x0) socket$inet6_tcp(0xa, 0x1, 0x0) r2 = syz_open_procfs(r1, &(0x7f0000000140)='net/mcfilter\x00') r3 = semget$private(0x0, 0x0, 0x1a8) semctl$GETALL(r3, 0x0, 0xd, &(0x7f0000000700)=""/49) setsockopt$ARPT_SO_SET_ADD_COUNTERS(0xffffffffffffffff, 0x0, 0x61, &(0x7f0000000080)={'filter\x00', 0x4}, 0x68) perf_event_open(&(0x7f0000000b40)={0x1, 0x70, 0x0, 0x0, 0x1000, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x8, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x2) perf_event_open$cgroup(&(0x7f0000000000)={0x0, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xc9c6, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x1}, 0xffffffffffffffff, 0x0, 0xffffffffffffffff, 0x0) r4 = syz_open_procfs(0x0, &(0x7f0000000740)='smaps\x00') r5 = creat(&(0x7f00000008c0)='./bus\x00', 0x0) ioctl$DRM_IOCTL_ADD_CTX(0xffffffffffffffff, 0xc0086420, &(0x7f0000000240)={0x0}) ioctl$DRM_IOCTL_LOCK(r2, 0x4008642a, &(0x7f0000000280)={r6, 0x2}) sendfile(r5, r4, 0x0, 0x10013c93a) 23:41:07 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:07 executing program 0: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', 0x0, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:07 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, &(0x7f0000000280)=0x44) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 557.598511] IPVS: ftp: loaded support on port[0] = 21 23:41:07 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:07 executing program 5 (fault-call:10 fault-nth:0): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 557.781871] cgroup: fork rejected by pids controller in /syz1 23:41:08 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:08 executing program 0 (fault-call:6 fault-nth:0): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:08 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 557.980002] FAULT_INJECTION: forcing a failure. [ 557.980002] name failslab, interval 1, probability 0, space 0, times 0 [ 558.053996] CPU: 1 PID: 27022 Comm: syz-executor.5 Not tainted 5.0.0+ #7 [ 558.060873] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.070228] Call Trace: [ 558.072825] dump_stack+0x172/0x1f0 [ 558.076556] should_fail.cold+0xa/0x1b [ 558.080461] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 558.085569] ? lock_downgrade+0x810/0x810 [ 558.089735] ? ___might_sleep+0x163/0x280 [ 558.093898] __should_failslab+0x121/0x190 [ 558.098148] should_failslab+0x9/0x14 [ 558.101957] __kmalloc+0x2dc/0x740 [ 558.105568] ? kernfs_fop_write+0x33d/0x480 [ 558.109904] kernfs_fop_write+0x33d/0x480 [ 558.114065] __vfs_write+0x116/0x8e0 [ 558.117787] ? kernfs_fop_open+0xd90/0xd90 [ 558.122025] ? kernel_read+0x120/0x120 [ 558.125919] ? __lock_is_held+0xb6/0x140 [ 558.129985] ? check_preemption_disabled+0x48/0x290 [ 558.135012] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 558.140465] ? rcu_read_lock_sched_held+0x110/0x130 [ 558.145485] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 558.150244] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.155799] ? __sb_start_write+0x1ac/0x360 [ 558.160124] vfs_write+0x20c/0x580 [ 558.163696] ksys_write+0xea/0x1f0 [ 558.167247] ? __ia32_sys_read+0xb0/0xb0 [ 558.171322] __x64_sys_write+0x73/0xb0 [ 558.175247] ? do_syscall_64+0x5b/0x610 [ 558.179241] do_syscall_64+0x103/0x610 [ 558.183144] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.188331] RIP: 0033:0x457f29 [ 558.191528] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.210430] RSP: 002b:00007f3acb193c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 558.218405] RAX: ffffffffffffffda RBX: 00007f3acb193c90 RCX: 0000000000457f29 [ 558.225671] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000005 [ 558.232946] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 558.240217] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3acb1946d4 [ 558.247486] R13: 00000000004c73b6 R14: 00000000004dcf60 R15: 0000000000000006 [ 558.284866] FAULT_INJECTION: forcing a failure. [ 558.284866] name failslab, interval 1, probability 0, space 0, times 0 [ 558.308166] CPU: 1 PID: 27038 Comm: syz-executor.0 Not tainted 5.0.0+ #7 [ 558.315047] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.324407] Call Trace: [ 558.327009] dump_stack+0x172/0x1f0 [ 558.330658] should_fail.cold+0xa/0x1b [ 558.334575] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 558.339684] ? lock_downgrade+0x810/0x810 [ 558.343855] ? ___might_sleep+0x163/0x280 [ 558.348020] __should_failslab+0x121/0x190 [ 558.352759] should_failslab+0x9/0x14 [ 558.356573] kmem_cache_alloc+0x2b2/0x6f0 [ 558.360832] mmu_topup_memory_caches+0x97/0x490 [ 558.365512] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 558.371107] ? kvm_hv_setup_tsc_page+0xae/0x6d0 [ 558.375787] kvm_mmu_load+0x21/0x1300 [ 558.379649] ? kvm_lapic_enable_pv_eoi+0x170/0x170 [ 558.384652] ? vcpu_enter_guest+0x2aba/0x6290 [ 558.389169] ? lockdep_hardirqs_on+0x415/0x5d0 [ 558.393765] vcpu_enter_guest+0x3d72/0x6290 [ 558.398105] ? emulator_read_emulated+0x50/0x50 [ 558.402784] ? lock_acquire+0x16f/0x3f0 [ 558.406767] ? kvm_arch_vcpu_ioctl_run+0x240/0x16e0 [ 558.411798] kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 558.416649] ? kvm_arch_vcpu_ioctl_run+0x425/0x16e0 [ 558.421861] kvm_vcpu_ioctl+0x4dc/0xfa0 [ 558.425853] ? kvm_vcpu_block+0xcd0/0xcd0 [ 558.430095] ? mark_held_locks+0x100/0x100 [ 558.434404] ? proc_fail_nth_write+0x9d/0x1e0 [ 558.438912] ? proc_cwd_link+0x1d0/0x1d0 [ 558.442987] ? __f_unlock_pos+0x19/0x20 [ 558.446970] ? find_held_lock+0x35/0x130 [ 558.451038] ? __fget+0x340/0x540 [ 558.454493] ? find_held_lock+0x35/0x130 [ 558.458560] ? __fget+0x340/0x540 [ 558.462034] ? kvm_vcpu_block+0xcd0/0xcd0 [ 558.466189] do_vfs_ioctl+0xd6e/0x1390 [ 558.470090] ? ioctl_preallocate+0x210/0x210 [ 558.474569] ? smack_file_ioctl+0x196/0x300 [ 558.478905] ? smack_file_lock+0x240/0x240 [ 558.483180] ? __fget+0x367/0x540 [ 558.486652] ? iterate_fd+0x360/0x360 [ 558.490476] ? __sanitizer_cov_trace_const_cmp1+0x1a/0x20 [ 558.496024] ? fput+0x128/0x1a0 [ 558.499320] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 558.504867] ? security_file_ioctl+0x93/0xc0 [ 558.509285] ksys_ioctl+0xab/0xd0 [ 558.512781] __x64_sys_ioctl+0x73/0xb0 [ 558.516677] do_syscall_64+0x103/0x610 [ 558.520589] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 558.525784] RIP: 0033:0x457f29 [ 558.528984] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 558.547894] RSP: 002b:00007fca5789fc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000010 [ 558.555611] RAX: ffffffffffffffda RBX: 00007fca5789fc90 RCX: 0000000000457f29 [ 558.562881] RDX: 0000000000000000 RSI: 000000000000ae80 RDI: 0000000000000005 [ 558.570171] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 558.577445] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fca578a06d4 23:41:08 executing program 4 (fault-call:7 fault-nth:0): r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 558.584728] R13: 00000000004c0e61 R14: 00000000004d2cb8 R15: 0000000000000006 23:41:08 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 558.651623] FAULT_INJECTION: forcing a failure. [ 558.651623] name failslab, interval 1, probability 0, space 0, times 0 23:41:08 executing program 5 (fault-call:10 fault-nth:1): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:08 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:08 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:08 executing program 0 (fault-call:6 fault-nth:1): r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 558.883085] FAULT_INJECTION: forcing a failure. [ 558.883085] name failslab, interval 1, probability 0, space 0, times 0 [ 558.918380] CPU: 1 PID: 27161 Comm: syz-executor.5 Not tainted 5.0.0+ #7 [ 558.925257] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 558.934615] Call Trace: [ 558.937228] dump_stack+0x172/0x1f0 [ 558.940876] should_fail.cold+0xa/0x1b [ 558.944781] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 558.949896] ? lock_downgrade+0x810/0x810 [ 558.954058] ? ___might_sleep+0x163/0x280 [ 558.958222] __should_failslab+0x121/0x190 [ 558.962470] should_failslab+0x9/0x14 [ 558.966275] kmem_cache_alloc_trace+0x2d1/0x760 [ 558.970955] ? _raw_spin_unlock_irq+0x54/0x90 [ 558.975519] find_css_set+0x742/0x1a20 [ 558.979424] ? css_task_iter_advance+0x2f0/0x2f0 [ 558.984185] ? lockdep_hardirqs_on+0x415/0x5d0 [ 558.988778] ? retint_kernel+0x2d/0x2d [ 558.992671] ? trace_hardirqs_on_caller+0x6a/0x220 [ 558.997635] cgroup_migrate_prepare_dst+0x104/0x780 [ 559.002664] cgroup_attach_task+0x3f8/0x8b0 [ 559.007004] ? cgroup_migrate+0x1f0/0x1f0 [ 559.011156] ? kasan_check_read+0x11/0x20 [ 559.015321] ? __validate_process_creds+0x300/0x300 [ 559.020354] __cgroup1_procs_write.constprop.0+0x321/0x400 [ 559.025983] ? __cgroup1_procs_write.constprop.0+0x321/0x400 [ 559.031791] cgroup1_procs_write+0x2b/0x40 [ 559.036090] cgroup_file_write+0x245/0x7a0 [ 559.040338] ? __cgroup1_procs_write.constprop.0+0x400/0x400 [ 559.046147] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 559.051083] ? kernfs_fop_write+0x289/0x480 [ 559.055417] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 559.060351] kernfs_fop_write+0x2ba/0x480 [ 559.064504] ? trace_hardirqs_on_caller+0x6a/0x220 [ 559.069448] __vfs_write+0x116/0x8e0 [ 559.073168] ? kernfs_fop_open+0xd90/0xd90 [ 559.077405] ? kernel_read+0x120/0x120 [ 559.081300] ? __lock_is_held+0xb6/0x140 [ 559.085363] ? check_preemption_disabled+0x48/0x290 [ 559.090387] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 559.095849] ? rcu_read_lock_sched_held+0x110/0x130 [ 559.100870] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 559.105628] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 559.111170] ? __sb_start_write+0x1ac/0x360 [ 559.115500] vfs_write+0x20c/0x580 [ 559.119133] ksys_write+0xea/0x1f0 [ 559.122683] ? __ia32_sys_read+0xb0/0xb0 [ 559.126765] ? do_syscall_64+0x26/0x610 [ 559.130744] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.136111] ? do_syscall_64+0x26/0x610 [ 559.140095] __x64_sys_write+0x73/0xb0 [ 559.143992] do_syscall_64+0x103/0x610 [ 559.147891] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.153084] RIP: 0033:0x457f29 [ 559.156279] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.175187] RSP: 002b:00007f3acb193c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 23:41:09 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 559.182906] RAX: ffffffffffffffda RBX: 00007f3acb193c90 RCX: 0000000000457f29 [ 559.190264] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000005 [ 559.197540] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 559.204817] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3acb1946d4 [ 559.212096] R13: 00000000004c73b6 R14: 00000000004dcf60 R15: 0000000000000006 [ 559.227572] CPU: 0 PID: 27130 Comm: syz-executor.4 Not tainted 5.0.0+ #7 [ 559.234446] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.243802] Call Trace: [ 559.246404] dump_stack+0x172/0x1f0 [ 559.250051] should_fail.cold+0xa/0x1b [ 559.253957] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.259069] ? lock_downgrade+0x810/0x810 [ 559.263226] ? ___might_sleep+0x163/0x280 [ 559.267389] __should_failslab+0x121/0x190 [ 559.271632] should_failslab+0x9/0x14 [ 559.275443] kmem_cache_alloc_node_trace+0x270/0x720 [ 559.280548] ? __lock_acquire+0x53b/0x4700 23:41:09 executing program 5 (fault-call:10 fault-nth:2): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 559.284788] ? __lock_acquire+0x53b/0x4700 [ 559.289029] ? __lock_acquire+0x53b/0x4700 [ 559.293333] ? kstrtouint+0x142/0x1a0 [ 559.297153] __get_vm_area_node+0x12b/0x3a0 [ 559.301475] ? mark_held_locks+0x100/0x100 [ 559.305731] __vmalloc_node_range+0xd4/0x790 [ 559.310213] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 559.315069] ? __might_fault+0x12b/0x1e0 [ 559.319140] __vmalloc+0x44/0x50 [ 559.322514] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 559.327360] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 559.332043] bpf_prog_alloc+0x31/0x230 [ 559.336047] __get_filter+0xe8/0x280 [ 559.339776] sk_attach_filter+0x1e/0xa0 [ 559.343808] sock_setsockopt+0x1b78/0x2040 [ 559.348069] ? sock_enable_timestamp+0xe0/0xe0 [ 559.352993] ? kasan_check_write+0x14/0x20 [ 559.357249] ? __fget_light+0x1a9/0x230 [ 559.361231] ? __fdget+0x1b/0x20 [ 559.364608] ? security_socket_setsockopt+0x93/0xc0 [ 559.369699] __sys_setsockopt+0x238/0x280 [ 559.373868] ? kernel_accept+0x310/0x310 [ 559.377943] ? trace_hardirqs_on_thunk+0x1a/0x1c 23:41:09 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 559.382722] ? do_syscall_64+0x26/0x610 [ 559.386720] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.392092] ? do_syscall_64+0x26/0x610 [ 559.396078] __x64_sys_setsockopt+0xbe/0x150 [ 559.400498] do_syscall_64+0x103/0x610 [ 559.404399] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.409591] RIP: 0033:0x457f29 [ 559.412792] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 23:41:09 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 559.431704] RSP: 002b:00007fec5986cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 559.439419] RAX: ffffffffffffffda RBX: 00007fec5986cc90 RCX: 0000000000457f29 [ 559.446698] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 559.453975] RBP: 000000000073c040 R08: 0000000000000010 R09: 0000000000000000 [ 559.461242] R10: 000000002002eff0 R11: 0000000000000246 R12: 00007fec5986d6d4 [ 559.468516] R13: 00000000004c594f R14: 00000000004d9b88 R15: 0000000000000007 [ 559.505815] syz-executor.4: vmalloc: allocation failure: 4096 bytes, mode:0x6080c0(GFP_KERNEL|__GFP_ZERO), nodemask=(null),cpuset=syz4,mems_allowed=0-1 [ 559.520635] CPU: 0 PID: 27130 Comm: syz-executor.4 Not tainted 5.0.0+ #7 [ 559.527486] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.536842] Call Trace: [ 559.539438] dump_stack+0x172/0x1f0 [ 559.543075] warn_alloc.cold+0x87/0x17f [ 559.547061] ? zone_watermark_ok_safe+0x260/0x260 [ 559.551917] ? rcu_read_lock_sched_held+0x110/0x130 [ 559.556944] ? __lock_acquire+0x53b/0x4700 [ 559.561200] ? __get_vm_area_node+0x2df/0x3a0 [ 559.565719] ? mark_held_locks+0x100/0x100 [ 559.569966] __vmalloc_node_range+0x48a/0x790 [ 559.574470] ? __might_fault+0x12b/0x1e0 [ 559.578546] __vmalloc+0x44/0x50 [ 559.581920] ? bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 559.586773] bpf_prog_alloc_no_stats+0x6b/0x2b0 [ 559.591448] bpf_prog_alloc+0x31/0x230 [ 559.595349] __get_filter+0xe8/0x280 [ 559.599070] sk_attach_filter+0x1e/0xa0 [ 559.603047] sock_setsockopt+0x1b78/0x2040 [ 559.607292] ? sock_enable_timestamp+0xe0/0xe0 [ 559.611882] ? kasan_check_write+0x14/0x20 [ 559.616122] ? __fget_light+0x1a9/0x230 [ 559.620101] ? __fdget+0x1b/0x20 [ 559.623472] ? security_socket_setsockopt+0x93/0xc0 [ 559.628499] __sys_setsockopt+0x238/0x280 [ 559.632656] ? kernel_accept+0x310/0x310 [ 559.636750] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 559.641515] ? do_syscall_64+0x26/0x610 [ 559.645499] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.650866] ? do_syscall_64+0x26/0x610 [ 559.654849] __x64_sys_setsockopt+0xbe/0x150 [ 559.659264] do_syscall_64+0x103/0x610 [ 559.663170] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 559.668353] RIP: 0033:0x457f29 [ 559.671542] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 559.690440] RSP: 002b:00007fec5986cc78 EFLAGS: 00000246 ORIG_RAX: 0000000000000036 [ 559.699101] RAX: ffffffffffffffda RBX: 00007fec5986cc90 RCX: 0000000000457f29 [ 559.706367] RDX: 000000000000001a RSI: 0000000000000001 RDI: 0000000000000006 [ 559.713634] RBP: 000000000073c040 R08: 0000000000000010 R09: 0000000000000000 [ 559.720901] R10: 000000002002eff0 R11: 0000000000000246 R12: 00007fec5986d6d4 [ 559.728169] R13: 00000000004c594f R14: 00000000004d9b88 R15: 0000000000000007 23:41:09 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) [ 559.818018] FAULT_INJECTION: forcing a failure. [ 559.818018] name failslab, interval 1, probability 0, space 0, times 0 [ 559.829858] CPU: 0 PID: 27185 Comm: syz-executor.5 Not tainted 5.0.0+ #7 [ 559.836722] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 559.836787] Call Trace: [ 559.836813] dump_stack+0x172/0x1f0 [ 559.836841] should_fail.cold+0xa/0x1b [ 559.856455] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 559.861567] ? lock_downgrade+0x810/0x810 [ 559.861587] ? ___might_sleep+0x163/0x280 [ 559.861609] __should_failslab+0x121/0x190 [ 559.861628] should_failslab+0x9/0x14 [ 559.861644] kmem_cache_alloc_trace+0x2d1/0x760 [ 559.882583] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 559.888041] ? rcu_read_lock_sched_held+0x110/0x130 [ 559.893069] allocate_cgrp_cset_links+0x19d/0x240 [ 559.897922] find_css_set+0x768/0x1a20 [ 559.901828] ? css_task_iter_advance+0x2f0/0x2f0 [ 559.906603] ? lock_is_held_type+0x17e/0x210 [ 559.911031] cgroup_migrate_prepare_dst+0x104/0x780 [ 559.916088] cgroup_attach_task+0x3f8/0x8b0 [ 559.920417] ? cgroup_migrate+0x1f0/0x1f0 [ 559.924567] ? kasan_check_read+0x11/0x20 [ 559.928733] ? __validate_process_creds+0x300/0x300 [ 559.933766] __cgroup1_procs_write.constprop.0+0x321/0x400 [ 559.939392] ? __cgroup1_procs_write.constprop.0+0x321/0x400 [ 559.945193] cgroup1_procs_write+0x2b/0x40 [ 559.949432] cgroup_file_write+0x245/0x7a0 [ 559.953669] ? __cgroup1_procs_write.constprop.0+0x400/0x400 [ 559.959485] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 559.964424] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 559.969351] kernfs_fop_write+0x2ba/0x480 [ 559.973500] __vfs_write+0x116/0x8e0 [ 559.977212] ? kernfs_fop_open+0xd90/0xd90 [ 559.981444] ? kernel_read+0x120/0x120 [ 559.985334] ? __lock_is_held+0xb6/0x140 [ 559.989393] ? check_preemption_disabled+0x48/0x290 [ 559.994415] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 560.000040] ? rcu_read_lock_sched_held+0x110/0x130 [ 560.005066] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 560.009819] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 560.015367] ? __sb_start_write+0x1ac/0x360 [ 560.019697] vfs_write+0x20c/0x580 [ 560.023262] ksys_write+0xea/0x1f0 [ 560.026807] ? __ia32_sys_read+0xb0/0xb0 [ 560.030873] ? do_syscall_64+0x26/0x610 [ 560.034851] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.040225] ? do_syscall_64+0x26/0x610 [ 560.044203] __x64_sys_write+0x73/0xb0 [ 560.048092] do_syscall_64+0x103/0x610 [ 560.051981] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 560.057166] RIP: 0033:0x457f29 [ 560.060356] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 560.079342] RSP: 002b:00007f3acb193c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 560.087308] RAX: ffffffffffffffda RBX: 00007f3acb193c90 RCX: 0000000000457f29 [ 560.094574] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000005 [ 560.101842] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 560.109105] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3acb1946d4 [ 560.116379] R13: 00000000004c73b6 R14: 00000000004dcf60 R15: 0000000000000006 [ 560.128350] Mem-Info: [ 560.130891] active_anon:173911 inactive_anon:206 isolated_anon:0 [ 560.130891] active_file:7925 inactive_file:60298 isolated_file:0 [ 560.130891] unevictable:0 dirty:220 writeback:0 unstable:0 [ 560.130891] slab_reclaimable:14951 slab_unreclaimable:116479 [ 560.130891] mapped:58675 shmem:277 pagetables:2703 bounce:0 [ 560.130891] free:1154887 free_pcp:412 free_cma:0 [ 560.165301] Node 0 active_anon:695644kB inactive_anon:824kB active_file:31564kB inactive_file:241192kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:234700kB dirty:876kB writeback:0kB shmem:1108kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 176128kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 560.194243] Node 1 active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB isolated(anon):0kB isolated(file):0kB mapped:0kB dirty:4kB writeback:0kB shmem:0kB shmem_thp: 0kB shmem_pmdmapped: 0kB anon_thp: 0kB writeback_tmp:0kB unstable:0kB all_unreclaimable? no [ 560.221023] Node 0 DMA free:15908kB min:220kB low:272kB high:324kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:15992kB managed:15908kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 560.247817] lowmem_reserve[]: 0 2553 2555 2555 [ 560.252501] Node 0 DMA32 free:818924kB min:36232kB low:45288kB high:54344kB active_anon:695644kB inactive_anon:824kB active_file:31564kB inactive_file:241192kB unevictable:0kB writepending:876kB present:3129332kB managed:2617972kB mlocked:0kB kernel_stack:9472kB pagetables:10812kB bounce:0kB free_pcp:1644kB local_pcp:844kB free_cma:0kB [ 560.312743] lowmem_reserve[]: 0 0 2 2 [ 560.317096] Node 0 Normal free:8kB min:28kB low:32kB high:36kB active_anon:0kB inactive_anon:0kB active_file:0kB inactive_file:0kB unevictable:0kB writepending:0kB present:786432kB managed:2204kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB 23:41:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 560.423898] lowmem_reserve[]: 0 0 0 0 [ 560.440002] Node 1 Normal free:3784708kB min:53624kB low:67028kB high:80432kB active_anon:0kB inactive_anon:0kB active_file:136kB inactive_file:0kB unevictable:0kB writepending:4kB present:3932160kB managed:3870184kB mlocked:0kB kernel_stack:0kB pagetables:0kB bounce:0kB free_pcp:0kB local_pcp:0kB free_cma:0kB [ 560.543954] lowmem_reserve[]: 0 0 0 0 [ 560.554335] Node 0 DMA: 1*4kB (U) 0*8kB 0*16kB 1*32kB (U) 2*64kB (U) 1*128kB (U) 1*256kB (U) 0*512kB 1*1024kB (U) 1*2048kB (M) 3*4096kB (M) = 15908kB [ 560.597792] Node 0 DMA32: 2434*4kB (UME) 490*8kB (UME) 129*16kB (UME) 458*32kB (UME) 333*64kB (UME) 65*128kB (UM) 5*256kB (UM) 12*512kB (UME) 3*1024kB (U) 4*2048kB (ME) 183*4096kB (M) = 828264kB [ 560.618281] Node 0 Normal: 0*4kB 1*8kB (U) 0*16kB 0*32kB 0*64kB 0*128kB 0*256kB 0*512kB 0*1024kB 0*2048kB 0*4096kB = 8kB [ 560.634739] Node 1 Normal: 67*4kB (UME) 247*8kB (UE) 272*16kB (UE) 48*32kB (UME) 19*64kB (UM) 11*128kB (UE) 4*256kB (UM) 5*512kB (UME) 4*1024kB (UME) 1*2048kB (U) 919*4096kB (M) = 3784708kB [ 560.652307] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 560.661775] Node 0 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 560.671630] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=1048576kB [ 560.681251] Node 1 hugepages_total=0 hugepages_free=0 hugepages_surp=0 hugepages_size=2048kB [ 560.691361] 68511 total pagecache pages 23:41:10 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:10 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:10 executing program 0: r0 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000100)='/dev/qat_adf_ctl\x00', 0x0, 0x0) ioctl$EVIOCGMASK(r0, 0x80104592, &(0x7f0000000240)={0x4, 0xcb, &(0x7f0000000140)="497a1890ce5d52e83e392591d0079be4592af90fa3e690b0d48aed7a01fa37182650aa42accbc2dfa6a30e3e5cffa483764cc50c6a90a74d14dfc0e2879a33f6883dabb0925dbf46cd31cd1126eecb8d436dd5b3e0c7c6943272040f488f945a4312d5f3340e1a7f1b1f20c33381cb89bbc0b22078e89f12d81716231c9eccd475daa080f2158dfd8b4ef884dea60c3c97384924be4391886d74814a69aac26284f4367ae38c288dd3706adb706b434e17dde6936b8fd2f696679c1eeef28d3fe34c65b7166aa0a2ec9bd2"}) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r3 = ioctl$KVM_CREATE_VM(r2, 0xae01, 0x0) r4 = openat$pfkey(0xffffffffffffff9c, &(0x7f0000000040)='/proc/self/net/pfkey\x00', 0x400, 0x0) openat$cgroup_ro(r4, &(0x7f0000000080)='cpu.stat\x00', 0x0, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r3, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) mmap(&(0x7f0000032000/0x4000)=nil, 0x4000, 0x4, 0x49153, r1, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, 0xffffffffffffffff, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(0xffffffffffffffff, 0xae80, 0x0) 23:41:10 executing program 5 (fault-call:10 fault-nth:3): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:10 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:10 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 560.701273] 0 pages in swap cache [ 560.705153] Swap cache stats: add 0, delete 0, find 0/0 [ 560.710646] Free swap = 0kB [ 560.713769] Total swap = 0kB [ 560.722683] 1965979 pages RAM [ 560.726214] 0 pages HighMem/MovableOnly [ 560.730223] 339412 pages reserved [ 560.733669] 0 pages cma reserved [ 560.775048] QAT: Invalid ioctl [ 560.789468] QAT: Invalid ioctl [ 560.903423] QAT: Invalid ioctl [ 560.907832] FAULT_INJECTION: forcing a failure. [ 560.907832] name failslab, interval 1, probability 0, space 0, times 0 [ 560.924808] QAT: Invalid ioctl [ 560.954578] CPU: 0 PID: 27322 Comm: syz-executor.5 Not tainted 5.0.0+ #7 [ 560.961442] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 560.970805] Call Trace: [ 560.973410] dump_stack+0x172/0x1f0 [ 560.977065] should_fail.cold+0xa/0x1b [ 560.980971] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 560.986092] __should_failslab+0x121/0x190 [ 560.990339] should_failslab+0x9/0x14 [ 560.994154] kmem_cache_alloc_trace+0x2d1/0x760 [ 560.998838] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 561.004298] ? rcu_read_lock_sched_held+0x110/0x130 [ 561.009327] allocate_cgrp_cset_links+0x19d/0x240 [ 561.014181] find_css_set+0x768/0x1a20 [ 561.018091] ? css_task_iter_advance+0x2f0/0x2f0 [ 561.022849] ? lockdep_hardirqs_on+0x415/0x5d0 [ 561.027440] ? trace_hardirqs_on_caller+0x6a/0x220 [ 561.032403] cgroup_migrate_prepare_dst+0x104/0x780 [ 561.037439] cgroup_attach_task+0x3f8/0x8b0 [ 561.041765] ? cgroup_migrate+0x1f0/0x1f0 [ 561.045920] ? kasan_check_read+0x11/0x20 [ 561.050088] ? __validate_process_creds+0x300/0x300 [ 561.055116] __cgroup1_procs_write.constprop.0+0x321/0x400 [ 561.060751] ? __cgroup1_procs_write.constprop.0+0x321/0x400 [ 561.066563] cgroup1_procs_write+0x2b/0x40 [ 561.070836] cgroup_file_write+0x245/0x7a0 [ 561.075082] ? __cgroup1_procs_write.constprop.0+0x400/0x400 [ 561.080881] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 561.086078] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 561.091005] kernfs_fop_write+0x2ba/0x480 [ 561.095152] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.099916] __vfs_write+0x116/0x8e0 [ 561.103629] ? retint_kernel+0x2d/0x2d [ 561.107514] ? kernfs_fop_open+0xd90/0xd90 [ 561.111751] ? kernel_read+0x120/0x120 [ 561.115637] ? __lock_is_held+0xb6/0x140 [ 561.119724] ? check_preemption_disabled+0x48/0x290 [ 561.124753] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 561.130204] ? rcu_read_lock_sched_held+0x110/0x130 [ 561.135218] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 561.139974] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.145511] ? __sb_start_write+0x1ac/0x360 [ 561.149838] vfs_write+0x20c/0x580 [ 561.153383] ksys_write+0xea/0x1f0 [ 561.156926] ? __ia32_sys_read+0xb0/0xb0 [ 561.160987] ? do_syscall_64+0x26/0x610 [ 561.164965] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.170325] ? do_syscall_64+0x26/0x610 [ 561.174302] __x64_sys_write+0x73/0xb0 [ 561.178189] do_syscall_64+0x103/0x610 [ 561.182080] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.187272] RIP: 0033:0x457f29 [ 561.190469] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.209385] RSP: 002b:00007f3acb193c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 561.217092] RAX: ffffffffffffffda RBX: 00007f3acb193c90 RCX: 0000000000457f29 [ 561.224781] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000005 [ 561.232061] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 561.239356] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3acb1946d4 [ 561.246655] R13: 00000000004c73b6 R14: 00000000004dcf60 R15: 0000000000000006 23:41:11 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x2, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:11 executing program 5 (fault-call:10 fault-nth:4): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:11 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:11 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:11 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:11 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191868"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(r1, r2, &(0x7f000002d000/0x18000)=nil, &(0x7f0000000100)=[@textreal={0x8, &(0x7f0000000040)="baf80c66b8f881d48b66efbafc0ced0f013166b93402000066b80000000066ba008000000f3066b9800000c00f326635004000000f303e0f00d0baf80c66b841dcc58066efbafc0cec0f01c80f01bb2db466b8e90000000f23d00f21f866351000000b0f23f8650f1acc", 0x6a}], 0x1, 0x34, &(0x7f0000000140)=[@flags={0x3, 0x10000}, @cstype3={0x5, 0x8}], 0x2) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 561.551553] FAULT_INJECTION: forcing a failure. [ 561.551553] name failslab, interval 1, probability 0, space 0, times 0 [ 561.591855] CPU: 0 PID: 27532 Comm: syz-executor.5 Not tainted 5.0.0+ #7 [ 561.598754] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 561.608105] Call Trace: [ 561.610719] dump_stack+0x172/0x1f0 [ 561.614365] should_fail.cold+0xa/0x1b [ 561.618262] ? fault_create_debugfs_attr+0x1e0/0x1e0 [ 561.623369] ? lock_downgrade+0x810/0x810 [ 561.627521] ? ___might_sleep+0x163/0x280 [ 561.631672] __should_failslab+0x121/0x190 [ 561.635917] should_failslab+0x9/0x14 [ 561.639728] kmem_cache_alloc_trace+0x2d1/0x760 [ 561.644396] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 561.649847] ? rcu_read_lock_sched_held+0x110/0x130 [ 561.654869] allocate_cgrp_cset_links+0x19d/0x240 [ 561.659723] find_css_set+0x768/0x1a20 [ 561.663627] ? css_task_iter_advance+0x2f0/0x2f0 [ 561.668381] ? trace_hardirqs_on_thunk+0x1a/0x1c [ 561.673156] cgroup_migrate_prepare_dst+0x104/0x780 [ 561.678172] ? trace_hardirqs_on+0x67/0x230 [ 561.682497] cgroup_attach_task+0x3f8/0x8b0 [ 561.686819] ? cgroup_migrate+0x1f0/0x1f0 [ 561.690990] ? kasan_check_read+0x11/0x20 [ 561.695147] ? __validate_process_creds+0x300/0x300 [ 561.700169] ? retint_kernel+0x2d/0x2d [ 561.704066] __cgroup1_procs_write.constprop.0+0x321/0x400 [ 561.709688] ? __cgroup1_procs_write.constprop.0+0x321/0x400 [ 561.715506] cgroup1_procs_write+0x2b/0x40 [ 561.719747] cgroup_file_write+0x245/0x7a0 [ 561.723983] ? __cgroup1_procs_write.constprop.0+0x400/0x400 [ 561.729784] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 561.734730] ? cgroup_migrate_add_task+0x8a0/0x8a0 [ 561.739661] kernfs_fop_write+0x2ba/0x480 [ 561.743835] __vfs_write+0x116/0x8e0 [ 561.747564] ? kernfs_fop_open+0xd90/0xd90 [ 561.751798] ? kernel_read+0x120/0x120 [ 561.755687] ? __lock_is_held+0xb6/0x140 [ 561.759761] ? check_preemption_disabled+0x48/0x290 [ 561.764783] ? rcu_lockdep_current_cpu_online+0xe3/0x130 [ 561.770238] ? rcu_read_lock_sched_held+0x110/0x130 [ 561.775254] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 561.780008] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 561.785546] ? __sb_start_write+0x1ac/0x360 [ 561.789868] vfs_write+0x20c/0x580 [ 561.793409] ksys_write+0xea/0x1f0 [ 561.796951] ? __ia32_sys_read+0xb0/0xb0 [ 561.801025] __x64_sys_write+0x73/0xb0 [ 561.804922] ? do_syscall_64+0x5b/0x610 [ 561.808908] do_syscall_64+0x103/0x610 [ 561.812819] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 561.818014] RIP: 0033:0x457f29 [ 561.821229] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 561.840133] RSP: 002b:00007f3acb193c78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 561.847852] RAX: ffffffffffffffda RBX: 00007f3acb193c90 RCX: 0000000000457f29 [ 561.855122] RDX: 0000000000000012 RSI: 0000000020000180 RDI: 0000000000000005 [ 561.862387] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 561.869747] R10: 0000000000000000 R11: 0000000000000246 R12: 00007f3acb1946d4 [ 561.877015] R13: 00000000004c73b6 R14: 00000000004dcf60 R15: 0000000000000006 23:41:12 executing program 5 (fault-call:10 fault-nth:5): perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:12 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x3, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:12 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="04002dbd7100ffdbdf2500040000000801001f21b684973f5a0baf952996a6812efa10275fd82388e03af8d70554aa85189bad7d154c4e75ef00000000f218742723c4975ff1a1c30100b17a1f14338751668c01e6b010d16459865c840e25919c6f88e60e49de8294cb8769bc39acd9c53f96afe226267904d105801353287791cd778e1b5c49a17e73aa236b32c09028dfd7eb9e3741394b076b353e9f9c2d2414e321325a01686ebde8541e65263e83d8b2d0ba1bd5c5b6b107a3ac8903e288ae959dd8435a123ed4f8c980f206b01084191492029efc989c66903410dbc2acf2b586033e4a769d875db32641b371d4d522dcd469cfdf6e4ca0e4a1f12741fb0dc43623a374edfd880940833d3ed6dbfeed79ff1f504711b9289e64374bc99c529c7db0b3de0000419a09786750c4de7eb15ba90b6dbfc9741096a55c1ac2ce149cbf3accb431614d1deac9e33e20e6068d4c3d2bd98034692c2094c8b346008902daaa655e7fe866aa4ac1e3"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:12 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000080)='/dev/kvm\x00', 0x400004, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:12 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfc', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:12 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_GSI_ROUTING(r1, 0x4008ae6a, &(0x7f0000000100)={0x5, 0x0, [{0x2, 0x1, 0x0, 0x0, @msi={0x7, 0x7fff, 0x400}}, {0xfffffffffffff800, 0x1, 0x0, 0x0, @adapter={0x7, 0x3, 0x1, 0xff, 0x9}}, {0xc8, 0x3, 0x0, 0x0, @adapter={0x8000, 0x5, 0x1, 0x0, 0xb525}}, {0xa4bf, 0x3, 0x0, 0x0, @irqchip={0x6, 0x200}}, {0x3, 0x4, 0x0, 0x0, @irqchip={0x4, 0x8}}]}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:12 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x4, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:12 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:41:12 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x20000192) 23:41:12 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfd', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:12 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0xfea7, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$SNDRV_SEQ_IOCTL_SET_QUEUE_INFO(r0, 0xc08c5335, &(0x7f0000000280)={0xc16, 0x6, 0xffffffffffff3f46, 'queue0\x00', 0x8d}) link(&(0x7f0000000340)='./file0\x00', &(0x7f0000000380)='./file0/file0\x00') write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r1, 0xae80, 0x0) 23:41:13 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x5, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:13 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x7f', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) ioctl$FS_IOC_GET_ENCRYPTION_POLICY(r0, 0x400c6615, &(0x7f0000000280)) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:13 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:13 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$sock_x25_SIOCDELRT(r1, 0x890c, &(0x7f0000000100)={@remote={[], 0x1}, 0xc, 'veth1\x00'}) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$FS_IOC_SET_ENCRYPTION_POLICY(r0, 0x800c6613, &(0x7f0000000040)={0x0, @speck128, 0x3, "20cad72e2c47cbc8"}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="090086e245080000"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = openat$vcs(0xffffffffffffff9c, &(0x7f0000000080)='/dev/vcs\x00', 0x40, 0x0) write$P9_RMKDIR(r3, &(0x7f0000000200)={0x14, 0x49, 0x1, {0x28, 0x3, 0x3}}, 0x14) ioctl$KVM_NMI(r2, 0xae9a) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:13 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0x9) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) ioctl$sock_TIOCOUTQ(r0, 0x5411, &(0x7f0000000280)) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 566.248257] IPVS: ftp: loaded support on port[0] = 21 [ 566.288146] device bridge_slave_1 left promiscuous mode [ 566.293680] bridge0: port 2(bridge_slave_1) entered disabled state [ 566.344485] device bridge_slave_0 left promiscuous mode [ 566.349953] bridge0: port 1(bridge_slave_0) entered disabled state [ 567.946002] device hsr_slave_1 left promiscuous mode [ 568.037055] device hsr_slave_0 left promiscuous mode [ 568.117164] team0 (unregistering): Port device team_slave_1 removed [ 568.130065] team0 (unregistering): Port device team_slave_0 removed [ 568.143123] bond0 (unregistering): Releasing backup interface bond_slave_0 [ 568.229539] bond0 (unregistering): Released all slaves [ 568.398889] chnl_net:caif_netlink_parms(): no params data found [ 568.432145] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.438656] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.445579] device bridge_slave_0 entered promiscuous mode [ 568.452289] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.459008] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.466014] device bridge_slave_1 entered promiscuous mode [ 568.484533] bond0: Enslaving bond_slave_0 as an active interface with an up link [ 568.493997] bond0: Enslaving bond_slave_1 as an active interface with an up link [ 568.512231] team0: Port device team_slave_0 added [ 568.518305] team0: Port device team_slave_1 added [ 568.577379] device hsr_slave_0 entered promiscuous mode [ 568.615122] device hsr_slave_1 entered promiscuous mode [ 568.667919] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.674320] bridge0: port 2(bridge_slave_1) entered forwarding state [ 568.680890] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.687275] bridge0: port 1(bridge_slave_0) entered forwarding state [ 568.718994] 8021q: adding VLAN 0 to HW filter on device bond0 [ 568.754427] IPv6: ADDRCONF(NETDEV_CHANGE): veth0: link becomes ready [ 568.762850] bridge0: port 1(bridge_slave_0) entered disabled state [ 568.780620] bridge0: port 2(bridge_slave_1) entered disabled state [ 568.791997] IPv6: ADDRCONF(NETDEV_CHANGE): bond0: link becomes ready [ 568.804549] 8021q: adding VLAN 0 to HW filter on device team0 [ 568.815406] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_0: link becomes ready [ 568.823349] bridge0: port 1(bridge_slave_0) entered blocking state [ 568.829765] bridge0: port 1(bridge_slave_0) entered forwarding state [ 568.855753] IPv6: ADDRCONF(NETDEV_CHANGE): bridge_slave_1: link becomes ready [ 568.863399] bridge0: port 2(bridge_slave_1) entered blocking state [ 568.869814] bridge0: port 2(bridge_slave_1) entered forwarding state [ 568.878263] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_0: link becomes ready [ 568.896919] hsr0: Slave A (hsr_slave_0) is not up; please bring it up to get a fully working HSR network [ 568.906876] hsr0: Slave B (hsr_slave_1) is not up; please bring it up to get a fully working HSR network [ 568.920432] IPv6: ADDRCONF(NETDEV_CHANGE): team0: link becomes ready [ 568.928438] IPv6: ADDRCONF(NETDEV_CHANGE): team_slave_1: link becomes ready [ 568.942882] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_0: link becomes ready [ 568.950958] IPv6: ADDRCONF(NETDEV_CHANGE): hsr_slave_1: link becomes ready [ 568.969945] 8021q: adding VLAN 0 to HW filter on device batadv0 [ 568.977658] IPv6: ADDRCONF(NETDEV_CHANGE): hsr0: link becomes ready 23:41:20 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:20 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:41:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x8c', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:20 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x6, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$FS_IOC_SETFLAGS(r1, 0x40086602, &(0x7f0000000040)=0x80000001) 23:41:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d59151146ca29cf4af60bfec80c91a52461d1de3a7e2766844659c067f0e41"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000280)={0x5}, 0x1) 23:41:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) openat$dir(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0, 0x2) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) sendmsg$nfc_llcp(r0, &(0x7f0000000500)={&(0x7f00000002c0)={0x27, 0x1, 0x0, 0x7, 0x4, 0x5, "96a96b75b2f840a78c165e08f3d344c039d5bed6a3bbea059da2e4ebcbe031dddf07213b7d98b181a7a1837cb3442387b85cd878e0fa812d80cbd6e11e7374", 0x5}, 0x60, &(0x7f0000000480)=[{&(0x7f0000000340)="ac466d8e066496a968a8c9b17f811a8a05f030aac879f1fbb5cbd65249b0fd535798c54493b745e7e652d4fc7d240a6b2afbc759577265af6e9600364576612a560270537ebbd26a36159a806adc5dbfd25664e482f6d1a8d80c3d4b65d290ce5925ddf10a5b5b85f635b1a4c64a00d85ac861cf80fe69b5bf7addcbb074b96388b478ec2744c785674b6dc251be0a358961a270d109980d54110cb5800bd15bf07a1a3058888726a333a992cf3069ab8be321fe50646df094d9cee7a3a019e4bc66a5c4615be56d72fd97df2257c405ea74c6780fc6e737c5534520af80d2ba170c0a5e07fa3c57325962", 0xeb}], 0x1, &(0x7f00000004c0)={0x30, 0x801dfdb7d790b80f, 0x1, "5b3ee99bb9e59e3b8e72b4588faffe163aa74884b6ab337556effd465fea"}, 0x30, 0x20000000}, 0x80) 23:41:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x97', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:20 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x40004) 23:41:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x101100) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000180)={0x10, 0x5, {0x53, 0x40, 0x1, {0x4, 0x7}, {0xffffffff, 0x8}, @period={0x59, 0x6, 0x6, 0x4, 0x2, {0x20, 0x7, 0x2, 0x5}, 0x6, &(0x7f0000000140)=[0x1ff, 0x3, 0xffffffffffffff44, 0x5, 0x8, 0x6]}}, {0x54, 0xa16, 0x5, {0x100, 0xffff}, {0xa8, 0xfffffffffffffffa}, @rumble={0x3, 0x2f7}}}) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000100)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:20 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$P9_RXATTRCREATE(r0, &(0x7f0000000280)={0x7, 0x21, 0x2}, 0x7) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:20 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x7, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:20 executing program 5: r0 = syz_open_dev$radio(&(0x7f0000000300)='/dev/radio#\x00', 0x2, 0x2) setsockopt$inet6_tcp_TCP_ULP(r0, 0x6, 0x1f, &(0x7f0000000340)='tls\x00', 0x4) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$XDP_STATISTICS(r1, 0x11b, 0x7, &(0x7f0000000280), &(0x7f00000002c0)=0x18) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:20 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r0 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r1, 0x8912, 0x400200) ptrace$setopts(0x4206, 0x0, 0x0, 0x0) r2 = gettid() tkill(r2, 0x1000000000016) 23:41:20 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xeb', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:20 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}}, 0x40004) 23:41:20 executing program 5: r0 = openat$cachefiles(0xffffffffffffff9c, &(0x7f0000001100)='/dev/cachefiles\x00', 0x100, 0x0) ioctl$VIDIOC_S_HW_FREQ_SEEK(r0, 0x40305652, &(0x7f0000001140)={0x693, 0x3, 0x200, 0x8, 0x1000, 0x5, 0x10001}) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000380)='./file0\x00', 0xffffdffffffffffb, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r4 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) bpf$BPF_BTF_LOAD(0x12, &(0x7f00000022c0)={&(0x7f0000002300)=ANY=[@ANYBLOB="9fb51be697beca"], 0x0, 0x7}, 0x20) socketpair$unix(0x1, 0x2, 0x0, &(0x7f0000000040)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r5, 0x8912, 0x400200) bpf$BPF_BTF_LOAD(0x12, &(0x7f0000000000)={&(0x7f0000002300)=ANY=[], &(0x7f0000000100)=""/4096, 0x14e147, 0x1000, 0x1}, 0x20) getsockopt$inet_sctp_SCTP_GET_PEER_ADDR_INFO(r1, 0x84, 0xf, &(0x7f0000000280)={r3, @in6={{0xa, 0x101, 0x10000, @mcast1, 0xad0}}, 0x401, 0x8001, 0x9, 0x9, 0x80000001}, &(0x7f0000000340)=0x98) write$cgroup_pid(r4, &(0x7f0000000180), 0x12) 23:41:20 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x8c40, 0x0) r4 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000080)='/dev/hwrng\x00', 0x40, 0x0) ioctl$KVM_IRQFD(r1, 0x4020ae76, &(0x7f0000000100)={r3, 0x73, 0x3ff, r4}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:20 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0xc, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xf6', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:21 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}}, 0x40004) 23:41:21 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000020174c9d9ceea8f63c76ec1d20cf5e732de84aaa7fdf152e9b914a83c282d5915114c91a52461d01e3a7e27668442d4000000100000000000000000000"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) socket$inet6_udp(0xa, 0x2, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000ea6fe71918551b6bb6a48a7b4c12efb89e0692a414853f18143298d28cee97572f56f907c083e326e52867e218"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:21 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x11, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xfd', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:21 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:21 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) ioctl$EXT4_IOC_SWAP_BOOT(r0, 0x6611) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = accept4$packet(0xffffffffffffff9c, &(0x7f0000000280)={0x11, 0x0, 0x0, 0x1, 0x0, 0x6, @local}, &(0x7f00000002c0)=0x14, 0x800) r2 = socket$inet6(0xa, 0x7, 0x7fffffff) connect(r1, &(0x7f0000000300)=@pppol2tpv3in6={0x18, 0x1, {0x0, r2, 0x3, 0x3, 0x2, 0x4, {0xa, 0x4e23, 0xff, @remote, 0x6e23}}}, 0x80) r3 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r3, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r3, 0x84, 0x6c, &(0x7f0000000200)={r4, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r5 = openat$cgroup_procs(r3, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000180), 0x12) 23:41:21 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}}, 0x40004) 23:41:21 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x14, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:21 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x8000000000000000, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$SNDRV_RAWMIDI_IOCTL_DRAIN(r0, 0x40045731, &(0x7f00000000c0)=0x7) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x36, 0x0, 0x0) ioctl$VHOST_VSOCK_SET_RUNNING(r1, 0x4004af61, &(0x7f0000000080)=0x1) ioctl$FIBMAP(r1, 0x1, &(0x7f0000000040)=0x20) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:21 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:22 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d404a2ae22f79736c3807e57493146e4900c0c6a827a97e9c4a1c5e0bcf83a03e65c2e2203b66cda160702d143198941ce846e805ec64850f8127b74e204d8e7125935bf347bcad21733f69ca7beec978593ba6f3afb686097dd4363d13fcfc8e41fb4acd5492cb6723ccc2dff049ac0644c2d208eed185cd4d"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:22 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x0) 23:41:22 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x15, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$sock_SIOCGPGRP(0xffffffffffffff9c, 0x8904, &(0x7f0000000040)=0x0) ptrace$setopts(0x4206, r3, 0x7, 0x19) 23:41:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x3, 0x0, 0x1ff, 0x400, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x5, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = syz_open_dev$usb(&(0x7f0000000540)='/dev/bus/usb/00#/00#\x00', 0x8437, 0x3a402) mkdirat(r0, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) getsockopt$inet_sctp_SCTP_ENABLE_STREAM_RESET(r0, 0x84, 0x76, &(0x7f0000000640)={0x0, 0x9}, &(0x7f0000000680)=0x8) setsockopt$inet_sctp_SCTP_DEFAULT_SNDINFO(r0, 0x84, 0x22, &(0x7f00000006c0)={0x1ff, 0x8, 0x100, 0x27, r1}, 0x10) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) fstat(r2, &(0x7f00000003c0)={0x0, 0x0, 0x0, 0x0, 0x0}) lstat(&(0x7f0000000480)='./file0/file0\x00', &(0x7f00000004c0)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) fchownat(r2, &(0x7f0000000380)='./file0\x00', r3, r4, 0x400) getsockopt$inet_sctp_SCTP_RECONFIG_SUPPORTED(r0, 0x84, 0x75, &(0x7f0000000580)={0x0, 0x59cd}, &(0x7f00000005c0)=0x8) setsockopt$inet_sctp_SCTP_CONTEXT(r0, 0x84, 0x11, &(0x7f0000000600)={r5, 0x9}, 0x8) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="040084840900"], &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000280)=@assoc_value={0x0, 0x1b12}, &(0x7f00000002c0)=0x8) getsockopt$inet_sctp_SCTP_MAXSEG(r2, 0x84, 0xd, &(0x7f0000000300)=@assoc_id=r7, &(0x7f0000000340)=0x4) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000200)={r6, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r8 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r8, &(0x7f0000000180), 0x12) 23:41:22 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:22 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) ioctl$UI_DEV_DESTROY(r0, 0x5502) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:22 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x0) 23:41:22 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:22 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:22 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x16, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:22 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:22 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$hwrng(0xffffffffffffff9c, &(0x7f0000000280)='/dev/hwrng\x00', 0x200, 0x0) getsockopt$inet_sctp_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f0000000400)={0x0, 0x6}, &(0x7f0000000480)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffff9c, 0x84, 0x6f, &(0x7f0000000500)={0x0, 0x10, &(0x7f00000004c0)=[@in={0x2, 0x4e23, @broadcast}]}, &(0x7f0000000540)=0x10) getsockopt$inet_sctp6_SCTP_AUTH_ACTIVE_KEY(0xffffffffffffffff, 0x84, 0x18, &(0x7f00000017c0)={0x0}, &(0x7f0000001800)=0x8) getsockopt$inet_sctp_SCTP_SOCKOPT_CONNECTX3(0xffffffffffffffff, 0x84, 0x6f, &(0x7f0000003840)={0x0, 0x1c, &(0x7f0000003800)=[@in6={0xa, 0x4e22, 0x2, @loopback, 0x2}]}, &(0x7f0000003880)=0x10) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDR_INFO(0xffffffffffffffff, 0x84, 0xf, &(0x7f0000003f00)={0x0, @in6={{0xa, 0x4e23, 0x2, @mcast2, 0x3}}, 0x6, 0x7, 0x3ff, 0x6, 0x58c}, &(0x7f0000003fc0)=0x98) getsockopt$inet_sctp_SCTP_MAX_BURST(0xffffffffffffffff, 0x84, 0x14, &(0x7f0000004300)=@assoc_value={0x0}, &(0x7f0000004340)=0x8) getsockopt$inet_sctp_SCTP_RESET_STREAMS(0xffffffffffffff9c, 0x84, 0x77, &(0x7f00000057c0)={0x0, 0x8, 0x6, [0x1, 0x2, 0x9, 0x9, 0x0, 0x5bcbfc3f]}, &(0x7f0000005800)=0x14) sendmmsg$inet_sctp(r0, &(0x7f0000005880)=[{&(0x7f00000002c0)=@in={0x2, 0x4e23, @multicast2}, 0x10, &(0x7f00000003c0)=[{&(0x7f0000000300)="8dca0b8feb3dab5df008d16d84638ca0389f35ee842a15b501ef688a39917472aca082fef20f46783d00c875c97d672232537acc6b437734dad4b663ca61a2f9731a18151ebde295fef04f0b02a4f7a1acb0fd220f8980f0a21835c48e6aa112ef9e9b6464749e6f9c715d669d4fd0146907d7a85383d32c14325492415db0488d5c858d924308f1b70cf70934856b1af3e5886ec21085dedb30bb8e96cae3eb7c18261165b94d468d7a85ab2143306c6e", 0xb1}], 0x1, &(0x7f0000000580)=[@sndinfo={0x20, 0x84, 0x2, {0x6, 0x4, 0x3, 0x3, r1}}, @init={0x18, 0x84, 0x0, {0x100000001, 0x6, 0x7, 0xf}}, @init={0x18, 0x84, 0x0, {0x1f, 0x0, 0x6, 0x3}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast1}, @sndrcv={0x30, 0x84, 0x1, {0x47, 0x2, 0x2, 0x40, 0x7fffffff, 0xfffffffffffffc00, 0x100, 0x6, r2}}], 0x98, 0x24000000}, {&(0x7f0000000640)=@in6={0xa, 0x4e20, 0x0, @initdev={0xfe, 0x88, [], 0x1, 0x0}, 0x2}, 0x1c, &(0x7f0000001780)=[{&(0x7f0000000680)="d9ac14f0d8bd45832e9b1d602a21e7ef09c2bb902a793fe27f3eb6585d60a3c2318dfe9c1485d5693eacd75d486233be845f5db920aba2308e022a8220991b73f849d428bd7a92dc0d14ee3038c81e05e92e106f87f6b8b074cc5704ac7cf2e5b6edb7e66d2f950c623d54aaef3c4a330a335c11741e6892009c4e9457cc399aa47190056263d6703ab7734197648960878c8595a4c65bf80260921cf58813edc3da2960a6f28af8b6b2f5fcff8519db913dd3c08bf10bdaf8ba6d6d8e6bd4a49c02abfd0c17e3303dc75be677447cf912d90ff6cbc336dd104e38ee88d873f6ebe4e987f73b0fd0ac031a2cbcf0dc0275fb2ad2220f81d71e2553da135a27a5514048d7882495a39e883582bce91cb77b8ead035962f7d6f8a048bee32914f73681ffbb589f43bc49a2700ad32acce6396568d3527750360c371ff1765e81f0a11a5d4d082cae462730afda7f42a8a5f4e9ebec5d8209fd7e20048ccc9c2d92a459cb81ccee94088089365edb54d076b9e302ea3aff71f3bdaacbb1307dce8d3cfcea68087d52eefe1a90341dc58e4a20834cc1c1f0f9a05425338b67a9ca43adce1a001a4fe89f286fce87331642ede59f29bf8be59d1bf80299df6e8daad7595ab49dc6d1f49a99f3828d2a6c23204e10b8a7830dd357923ec1eecaf9cf7ac4e879dbb811f57397742ed5ab20fe654c036d6ce7bd473c4c6489ad21acd68b53184705b3c31bf64e872428b09cf498e82440eb020482d6ac0a476befb49fae355607eeb30317e34560cf0d3c7f8ab257a880833178fae412434d6b803003c0f8fdef5ab13afbc4fd1c3fea2cdd04644870d1145e493d95440bb7aa720ca8815108d9c4aaa30637989c812eaeb38c36545fe9f5fb0bd0134637e293bf7e170104b87f166f0f69b09f94081414633b53ed99b50b14abade0f1289db0ce38398793f5ac0a3b54cd07b543566b5385afb372bd3da2f6d3ff5d6b80737b0326fcf9db9c8596ee20f1ff594dad891cb9c1b50bb66c28bb2f63f436e887d9596307c891de151a0b5a7e0d0f067f5953545956064a7d1da2130af8d32a91235ebe0dc13f7663145f71b5fdef416089323a8768c927d9d2f6bf9d13b0bcf5b2948541909a94224d03e534c09e07f1beaf6baeb287444cd3b2e9e027317d4e58e5af757696413078bf4048a6e82d70095c5d3378bc22d0116933121ae951f65244538356a591475a38f4ecdc1d7a8e74948ec32410fe0b3227a279fed8e15a6458c3abc2b8541b41943fc81ab6b741b6be8b6551676c8bd28ec04575e7be857e729554dc6d4ae6be37c2f2d511a0031df277dd2d707fe1098d44524b28b9d022088118530c3d3f0a908adc80e7a1df4fcfd49cb6dcdd86bf956013afaa25fedd06eb47fdb1f51f75a60d1e610fc71da49fe7ad284cde9fd60a05fbd2334391e7021d980725214a986d8bb33268a2b1c53aa0abf3616836eef9fd8dae008821cf17dd12e1c27dc4a0a4ea59370733491f1fb8a68fa1533ba65ad63dc7fe5ff6bcb87ee5739b012004e5a85c789c5f53f978e315c17904ad1735067c950b72da91b532e88691032783d4852a60a20e7aa7ef39ec6b7be67d4a5ebacb99e665e57d29343df87a17edbe363e85bf5ea8ee96e4e275036a39d84cba8f23db5e0323c1e7c14c5d4e56c63d0d8984439127a8b15c77fa9d4c3f5e4407755837e0c94b75299bf92f354a438cac937cebe7aae87ed694b76db3f5323b16619e23b7c9359ecee7d5a06e5cf3f6cefe10b343b3391241413e34966601342154ee0f89ac77ecddd86e401df8e9da2bd70cb01589afe56db1d00ac562c3416c6de91eb2dc1db5eb3799868fe6fe250febfde6fbad123d89d9921d982fa67fd007de90208e0da3832680376db66d4700d8e34ccd7db8491012d5ecbe181fc318efa130a22e83b1b786a55438dd180d89eb046cd66cfb0dcc3d9ab2ad6bd61d437299da1c98c00e2c30ca87ff9d33802f937b69a0d82395e8d8e6c53dc7eb9fa71666b63cad01d44659590c449bb1978d03350b08ce0c7f1e1a3a09801e6830711fa46e958879ed05dfcda02e94999739f45176b26e3edf04edbf092d407d6a2e269154cc410f4042815670c1ce37c77adf7c54daf880f42a33383c0df92f82b61474f771c832aca7951eac7f7d2538f71429ffb08dca6a63bb06dfc0fe02761f7d22356ae6acb7668504dc48056d54cc48edd0c0912bed8987ed756416a69485239aa80bf98b1829d0d64313b8a44c8dee68ee583d33ad8a304ecd160c8d784cfbab178f5f65ba67a919fb0e08b18c4fcb2209d253f3bd51637906bd6ecc110b169a04f4f83b13eade1f5d30720c7a079daaa00e66b7dfc7d2bf6bda3b438e576c5a79c89794db14ce4b82c65ecbd048048e021690a779b85b1bd210f1b3e79e0998417de25fc2b107a0cc0da7a23db59b80467c0f2f6926f14b4886abdef852048d38db98ec671341e53a211affb3a9b3e6f0fdbbd8f323b885c1a9991bf1569ebada58feba67b577918793d3363c0b3b58061f1a7a8f23a2336bebddc22dae504b0ac9fb02f4065cea3b2a038bae099b680adf5264834c1ef2b8d27b4083b56b6ca59af52ff9d45e285bd2570c759395d6de5b440ccd5a67056daa14edc6a07bfef29bcf291186f9716bc5ffe7b84f59acc1a03f45d26c37b3de5dd14a1df938ead4e5ef08dff4ebe909edbb93dbfd08fc95b20736c4ec7cfcb78cd6f1dc81e62dca2e1c093b06470a2c21488344673bb928f781e0a5edeabb099ae522e4c0e934313099415e005db053af28ff3cd3a2756fad79ef2c004bba4e37e3c5e6af4e759dde3d1e5c99f0784be6ba2c0e8bcd6d2e10ff2dd43ffa0723010cbaa7ca0f6a239dfe8f1e4c7cc4c95d5b31a8f58caac2a9647dd981f08012a6fc04a75cb0a9ed8e99077f6ff14261ff8575fb21ffc6fd7807da07e1c566177ca76eb9d59bf0354bee93a705a28eb4860942bb6232c0479e1ae95a2d0d9b355402d9c389078d48a68df1b463781484ebd04de4daca7bae7f653a8dcc8cd9316ac7750736728e16a74df6ab587114fbe4cb251666e708aa6610dc9167e1614e1f935019ff98b0088f3d1f5f95c3bf107031237fcbead5860862c9946b54142039afc0cf40135249875c3c474e07e5c9124c7271b0e2f30684245793c27a646dc27b3a0a536ea66a67e88cd90a1fa9eac0445ecd8359ee8403961de52f595b53872a48837ae64636c5a5da42a38b7ccd81cddd02ab581280b34478477a674fd5bb1043cfb28dcd28a509272fe122bc8db94939b942dcf725fdbd022d71ba39c90cde7dc7ffaf37a295646fee49c70087327b5a176dbc8bedf024e2b65f8a64384da2fb99591d0d184558819fd1be942f098b3ee5fee20dac62211c145696e3ff62adfdfb3425d445a9825a40eab6c70335f5767fa39f7c6e690cd142ca4a29e676244fdb82d28ca3a09509b1f08f3d33a52c08e3aed6760c4d9b0a79c79a306a245df7c4fac9dd705531734f8eddc0da2021680f28ecd4f388cd2fa87f02e6439b5c696ca99ab6d8f68c034b7eac84512956573813500359719ead795607d735c1b220e0b4b1231da00dd1232d39867d9b0a6fb0be330e3eb8a64bc82d5f9517b3a3b29decdf89421af5a378a52abbfefeba4d177127fd7aa29435277b9b71f4707e2fe907b879d6631b199b1de905208338ec08946ddd48a1c339aee850ea0294ec222427d8df29eb7f422e322353c1947f4af02504dfb67dc231038f51d03b2b0d339b96a8d09b4569a08b0599f7e385d7a81ffafb234d4c848a3b0650ce44aaa4af4c1a93d4c85dfcb3d6e559ffafefb9e0b10d42192abd89f037be8cc492357ff092eb3c1e1d993e4f6ef2db1f1b3a7242d18e76785dd690bf3fdb670f2ba196299e82b7037c407e78871993feca0ec073cf53b2451ce9d21e6a2ddffaa4e5796f57d0c358939691fd433c15174866e431ecca89372c7f69a13d78425abf2c5bd9afc3107c969af4ee9acf1228a8632515627fdfe60e67718865f309977d7a39c5a185189265632e6e404624853138cf4cb242f63d7d6d800048f4793c8c4bcbbc67eedba4a3ed7c06dd3a651e6ccf72efce7d3959926e63c7bd9682f90ed2d74efc7ef32c84c0a4f213254cdf8a8465c676778dcecd59489712463f6204c2029fa8ce329db9b2bb72d30207d800c005bc1d08a681c4ed3fb312604a914d51ea5239cf1a5a5e833f29c1f553bbce1e7465ef75f8e8813eb652a604d6db81c9376d76f763bb21e030d1a9f6a36b44211815cc3dff256d8911c143d2427a75ef5d9cf5a2e055e5b2f3840ffa6b13a0d0ee5d1e2d47cfa52ea10bc5de6c7f3ca55ea92cb5a8fa8d5df3b92f1a381c7ae1946b029c98030463ca9d6d9cb556c305cc92befd36b8dc9b6bbd0712775bc1d4d271d8f18971040311a7c4481e5946e459af00636613dd8a3fa32e827af7d797ba7c7a9bfd195c4a3944333cd07cd110810fdcad077c738811dc6ce75281f7c920efc0247b6ece19f6cb6dae96415009b34ece2ff16431e872e3b4fc4c5fe53dae0b3316ac7a3e7cec6a5b23ed096cede22ae3f5e7d06d432f6ee636b40c25cc9cdb783eaed1d721b542b912c68ee7db510ffc9745942eeadf42583ffcba6059715768711ab108a56a6bd7f9c5e716e9d064306011c8826a3ce8a69cd1f26a2ecf0faa38bb0b136fa22a429bbffd4820c180485a4c6469e37e0ffda1fd88b9aee73038a32d06d01d1d3394972a63be110a33edb9a0144483dc51b6019b806584789ce5714253a1afb9d6ebe60c1c413a4329429b4a1c08950154e3da5f66c02b164579899a9293472b7c1b70dd3a2433706a3f8b1793b45138d314466578e0f725e48fbb9416e4e51077d0767fcffb308ec174d9b7e1d2fd8836129133c8791f556691c46c6ed1b1e9bbd82e38d9abb1f916fa0eba5068ba82c9a5c14159d8deddb0a81d4e7a3ed10aed05682fc3defd1b98596c6b33927c13c86805f151124da2c8878a6612ed7681f18897a1007c63f81a269a0fd464c3183d6eded2c6a71ba5ee6dd7e1d5b5c21d4f49f02d1e44558108dfc5921a8e5398642096578d1bbd86b0f64043cda31f362514d47d7f51f11c5e279b5f4fe601eec62a38026e84d626d770eddf0e9e56441f23f97c106fc3206e3ec5c727069433c8d056f9acec2f976157896bef4baaa1c733505a9b0c1fd443fb228327f087005b97538d581cb89e7206d78f1cf77eeea66fca9c287dad89e4e1c67371b14fa3178948d140a3cea266b2fd4bbbe5e3a54d7e31eb7aacd3ce55c9f7d84af81054183d53251070652d74b1f728179aa1ffb606753d136a5aeeb95eaf99c20250ad77d457e9278cfeecdbbdd5da394d88488076fe46415ac69b70f779ee98fb605a36edd4f7873e2b6e2b30d3154d50502e74615be83fb48a4589e355a74e19e5310385fdfd53ebe030fa478e966a3c44955277e6243f696dcd82483bd572b783618e64108eded8c34884d0424d67f5516dc6bfef1f1857553b573782b56178da3eebbbf5ece63f3ed3caa6fad1da96a9be76648f5342ccaeb0e0bca3eed4d3caba9f6931d9144af34f0ce6292854450dba95f2c1b74b6927ec8c2ca7ecd3a0d3d0a5a70a4a01adf6496f55231a15206b258efe9564137ae7f8e402fc1a5451e7388928de97aca6c31848df648a6b91248d70881b8e4a44e0cf6cffc88bdc68d37413fc6bed1d0a903f7e75f3c67da813c77eed5327e5571bbf61b574b6ac37d6bf5b12aac7c061", 0x1000}, {&(0x7f0000001680)="3564e7bf49e51c336526aea2383741683aea237d08d31ad335a2b4c01e913beda632cfe61f24d2366bb5c0db", 0x2c}, {&(0x7f00000016c0)="8966b2c229e74f0cfe576938378c0b35550cae4ec3e93974ea2506100b41d1dd6e1fdf16b12b0d8edba592b5c734fd43a92e18576b24952a87dce914303bc147b28f39145f2d2f0dde0cbb1d6fff525ea621007092f40aefce73e6b02b06665277a846780f5533d4e5cdf5303c228ffe5c790bb58a29e5f2f4", 0x79}, {&(0x7f0000001740)="bac4ce6488351c4b20a95434f5e4f842514212494f6e6eec65fef2", 0x1b}], 0x4, &(0x7f0000001840)=[@dstaddrv4={0x18, 0x84, 0x7, @dev={0xac, 0x14, 0x14, 0x22}}, @dstaddrv4={0x18, 0x84, 0x7, @rand_addr=0x80000001}, @init={0x18, 0x84, 0x0, {0x20, 0x2, 0x7f, 0x2}}, @sndinfo={0x20, 0x84, 0x2, {0x3ff, 0x8202, 0x89e, 0x0, r3}}, @prinfo={0x18, 0x84, 0x5, {0x30, 0x8}}, @dstaddrv4={0x18, 0x84, 0x7, @multicast2}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x6}}], 0xb0}, {&(0x7f0000001900)=@in6={0xa, 0x4e24, 0x9, @remote, 0xfffffffffffffffc}, 0x1c, &(0x7f0000002d00)=[{&(0x7f0000001940)="83fd9eab93fd277c2ccefa464a23437062bf1d8d4f37affd0d41342d67015a81ef368dd16952798627fed66771505598b085d93cff116bbb8e4026a351a3c38185c531fa86dccdd5a7e2f6722815569854df02c489ee4eeb22baf5ae6e60c2fa94d4ed0d88915ee735df2f6d2d6568d1aee98b0a5af898990a8206f7e2ca68cb9885383a0efff3f206f35d42bf2fb991179db397c4971b87ed3d92b7d189ad2872e67b61dcd2ef6e7f7d306286552afc21ef299941611403ca445ffe85e2f2d929e72ad20eb2abde846e79548183c966", 0xd0}, {&(0x7f0000001a40)="aacb37ac77e55baf7940045d0f867415d57bffd7d3abbbea3f6a91941b858b3790c0af", 0x23}, {&(0x7f0000001a80)="8d63bd9ce5fe4c88fab53934689a9f97ab15ee23e6718ae32dc45f0c432a54b191b6ba902f3f77d5896dbfc687781737f865b2353b1c2db692eb4eeffb8d672c59cdbc8795228c046546b58e068bf5224002508aa1b0c1d9eefe6887911122e15530b95b628a41be5af00e055bccbd0a02d0a7d97bee9da0268ab54185d507154e369a91c28fefae97febc451c3f4a294497662511d747d754a2a73a615d99130663ef37ca1f8805fd4ede9e2ae9923034b6a20c055d92f56717b8846cd04ce88b", 0xc1}, {&(0x7f0000001b80)="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", 0x1000}, {&(0x7f0000002b80)="7bc4d9ace63ac6037b64f12cc64728219eb7e5689b19ceb9e6c5390d15e927b472cd66d9ade9ceef0599dede6eaf79987dd65af7efc1f04dc3ebca9635722b773c70984d55c1664b456e0efeb1ea8c59a129906de88cd9a700ad8b4f9dbfb34b992769b325", 0x65}, {&(0x7f0000002c00)="3a1914d9404cefe15d5052240ab078754edd1f101e2c3e3bd0a8193157f58d06fb22aa17b0fc4226374594bbe9a9ce2637b170b6fc8bfda14847f9df8211cc9449e97b6e221aa0ec3aff57a4b019405d6df19886affaa422df5ea8556804bd273ee120968b50035a4e62ec2b5ee7d9c2224c0ce160358c366696af663f882442d26c0e9fcec7e08fa7d4a0a41d91d953cf7848f405dba352c1472383ed62b16068c039d58a3342cde48c9da4db2f7c355c976c6f41603e6fcf07cf402f545e7539a29383b58b484e0f8e32176edbd7", 0xcf}], 0x6, &(0x7f0000002d80)=[@dstaddrv4={0x18, 0x84, 0x7, @empty}], 0x18, 0x4000000}, {&(0x7f0000002dc0)=@in6={0xa, 0x4e20, 0x0, @rand_addr="8f5c4e3075312dba0f3a8c993684b778", 0xda1}, 0x1c, &(0x7f0000003080)=[{&(0x7f0000002e00)="6fb0590fe29ad2da864ccc08bbfad835f40313a3462b68320d1b5f8c7c6f5d1b1dea02ef79bea4dc4c1e58db0df4cc72b97b67204b2cc63849d9932696d572936562b72ec2f818dcff8479a0a98f05131e5b8bc8943e421e5153705479a10c3bfb885767897907c0d3332cdb804259306d72814c03a089c71c246461bb158d194810564ef992413aefc6b3a0155be6cdb0297f6f6c312ee1890ba8fc858b97907b1f44ad70d40d4f6a70a8b19276e0cc3720f1a91659c42c4e891bee2087dedb8f2f8246b1cee23b4aaf0af15b4d052f8c6c90676d9108ece9a35b3af8ab269c1aec716b56d713ca10053d", 0xeb}, {&(0x7f0000002f00)="d48f35d602a33fca2351abd9225a805663ad38ed6920145055293cf64de83c1325415e3c1632bdcb69c2df202aab776b7470b2ca5d0b93071cb5f5f9e5f5c1ee9ad5578d834f453a24ef22ba2d578df7812613e20bd508d8056e39f764e2c45589be2d8dcb6b532b24e717199953e1f57ee7706eaeafd345b6b86d2e738172a6df480ba3a288bf7f070ebbf5dd438c7d848068b3063d36ad6eb0ffce941b5e46132f628f0a36d10a5fd684d84222c230fbd207af80232086718c4f7aa32eac802fba70d9c7", 0xc5}, {&(0x7f0000003000)="91358d4c913e3ce37a3a1b9a0d1c08fe32864e9b95fd4f5613154126dfe88639f2240db6bdaabf232d94d6610c3484fe6b5bbb61eb4f40d44e785e620ff459b8887433d13f12722407a274c174a77e6f4658ad4246919be094d27d40bda94f69aeca62de89d09dc75b7451ec6e2da098a31ffe62", 0x74}], 0x3, &(0x7f00000030c0)=[@dstaddrv6={0x20, 0x84, 0x8, @remote}], 0x20, 0x24000000}, {&(0x7f0000003100)=@in={0x2, 0x4e24, @local}, 0x10, &(0x7f0000003740)=[{&(0x7f0000003140)="13ab936b9a2050743c921991b7aacb5b435b792d3682141d8ee05141f86e869dae062605aa34e421544eba2a73eb8312f4db3b77c4d4cdbbf0f0d0c1fd320d931b46645b532d14d1eb3859ef3dfccfd35269fce5b88992f52af0d1da78911abecc2fe9e75f5bfe79ebb1c8431a2d9377156263a5c2dfbfce1dd0b9bb2b42c74151131d356468b92712819613e8ad9de611bc91c64eaab3fd5112dd6f5b269875d87bc874e2ebc057d305a5f0debe56d17966b3dff467635e71dad764c997a30f80c96708f3e5db82d28952f03fc3666b8b00439b95e2c93166197abc240200876f7831a4f97a", 0xe6}, {&(0x7f0000003240)="1da3f7e8e0e154dcbfa8848cc2599ccc8d2dee3a56bf82d8241c9434f87b88afc94a7cdd8300f226ddcfe4177343aaf593f5c7caa513eb7094b0a26a2ccffd59a10692a03484b95a7a70e8e4cb5e8f99bfc22bdd3e498fa5fbf8f16dbdb9c37dde8aa5198bb65cd8566b537e0e5a6c5ee3ba7f032008a5dc2a6f6b1fafee75b980798f07065d8511f854d1ff78f4515ae130b0b388dc424b5a181c13f1534041c3b001c7cee45000d01a2bf05a46fdb38f06167c9bb4da1cbe2b42c51d3fce5b97250dd2eb31cf46e3db9ef9ba2de21a030077f88d3e7af2ffd73f2f6f0b920bf10a92d5a3", 0xe5}, {&(0x7f0000003340)="f55a9c953f761abeb5048d0bd9d183738a32c9ea3077c681bd2c90fe4ae1e80da96b56b2b0", 0x25}, {&(0x7f0000003380)="084b38cd49ed15d9db2a0440eeaea8dca0dca54d9c66b4dc91ad90c706378efbd3d1ecf09ef7a8719524279259b9d446d628c8450a62bd3bd9437b0548b59f9b21fd7be38ca3b25af31d8fe7479e4196ebdf2d79f4c096976f20eb2f0d7bbd38698738a36872c9086cc10574ce8397fe78757129ce7b4b005558a5ed33cd7c560bc271fe8da30b8c38fdff05e39a49", 0x8f}, {&(0x7f0000003440)="a39b379bd01e87d2dcf0e0", 0xb}, {&(0x7f0000003480)="1185ad34d4620096642c6e58052c31360c7f44134c6f074419a4e4cb58126abf2d719e9feca9fefe30ca3af9f7331994e2", 0x31}, {&(0x7f00000034c0)="8b0554dc55a59a1fee3e2862c4ad35d49de5b050422abf044f67889c54c9ed3aa8bfe23f055081739e2ec8d95e2d88b696bfba64d51d4d4273070c1c34f929f6241a667b8cba1f6ba34d1f83b404a63df0abe67d4399a176a2880a184ec410b0560983a8b430b9095b8b20edc0924ccb4591d1366d7e3cf572189abc3e18e55bc4e180720278a95241e36acfc3da1a83397798bbb30355e3ab962b8782e564bba45a98a7d7", 0xa5}, {&(0x7f0000003580)="b779782bf43f3f173dbaecdfb1f8c3d1bc31261e5c9e63a68246fe85fc21e2ca64723309623fe9e1e4c641cb16783f9aaaa32a22bcb79f38ea313a5602b8aa7cb3718a14f08c82641bf14b32b384c394b9cdcceb38bc79a4fc72bbf65302c9b3ed498efac493faa381ce50aff472b88b732f7fec12c57504b9", 0x79}, {&(0x7f0000003600)="6a6e1b1a4a4c1b18a26b4589ee83dba06b47169eb36d8960fe6bff74e766069d3f7417087056210f1dacf1b6359e0c6653ccea8e773658118e46da499c2dd0dcd8e02ee0ecbd47bf1cdbcfe981d97d0ddb7d1bea81220cde1a509097ad2d9f7aa2c430ec2e8aa8a30877e62e49daba5b9d07b89700eabf0bab6827b6eaed532969", 0x81}, {&(0x7f00000036c0)="1b3991fe586fd602b34ccc2dcbffe332338cbf4e53bc844a79fbf5c5222cfd0b875ccc481cd782ef4a35a0f1a28b082968a6081fe990b9dea27a5eb0eb01a84c1668db94a9f45a07aab43aa617082d79ff4b70028a61b551e066f1", 0x5b}], 0xa, &(0x7f00000038c0)=[@sndinfo={0x20, 0x84, 0x2, {0x2, 0x0, 0x100000001, 0x1, r4}}], 0x20, 0x4}, {&(0x7f0000003900)=@in={0x2, 0x4e22, @multicast1}, 0x10, &(0x7f0000003e40)=[{&(0x7f0000003940)="b11d2cb6d29d0bec1de56536687a6d0e3c89ea045638527dbc8a7a620bedebd8cd9f981cbfc31b772f4d7d130797e47e47755a9b890a1678a86319835e5cf1b9184afb6a0ba307275767917598f007a4f43aa6dd9c316e0a49b0554616bc735ce4206e740f52a61762d16b97c30a", 0x6e}, {&(0x7f00000039c0)="2551dfc2681f2d0c37f4805e85093fbd547a80e1a088cadc4b3263445f22702422190b60013347d1caa8a3694bdd4a0dd375ccf90314f3553a3612b341e553e341ef5d7a0eb0ff62425c12f7f082e5f278776442ca79f30bcc46a3994e2b2e288855807511513d4d468dfa15d61d6d1f81404ce3f04913f9801e0350c06c0c3b63da1c4811f8e47ba110860358557a92d09172b41b4b9a8244287a7909e4cc3b7d0865734b42075ed9dcb838312d5b58ca84ae9751dbd44b0c396fd4c3785f084d8caae234c8d56415cfe88122b22fca638efc07ce9304fc840485cb74fba426a2aafa", 0xe3}, {&(0x7f0000003ac0)="ef8d5d05d1e9aff877fa164ac4898ee8a4a85617a91300", 0x17}, {&(0x7f0000003b00)="3d32fcbaea9c424533ad4377f1eba72b2ae56ebb9251a0078a44d0fd79708b61ca3295d1713835f77bc6d428744c51faccc5218346307d218b2545ab21e3de34ccde213520bafee1a9649f567e9c018c744048cc5110644b2e6f2811db22b571b2c7ca21c714f2ee019269d0975ab28af5d07158f7019b73ee372f861d00851328a029dc9cceeb8e57300a05f80d827417f8", 0x92}, {&(0x7f0000003bc0)="18a399b548288f31d155c603d31bd46a6c2c0174e6b3d4eb0046035f55b60f2e528a0f5dcdd00b41de7b92416d8a16c6831a2638e4ba41375cb11668defe6adc7e2f8fe8607cc14843f8ab4d8b27e386608cfbc37949d6dee2acc152597c97e2f735d5f2946d4b57be3400e51aa1fcdc0ba42e23b92296fed9188a2a59f1c0d561cb90c347b4db5c6f331d85c66e78d10bfa04200ea22cef3388d55c353e38d9988f9c", 0xa3}, {&(0x7f0000003c80)="c42f19408ba1a96152f150792d77d23c011e7dc8ffa241ee73db381dcf4c4127aa11eb7f26de5403b0ec7e1d9b40afcead1b1ae00aec33a86ba991f03e2064d6c9f2077ed4a30130738c3ed2661b92a17b64680d5989f49a2cf0902326c4", 0x5e}, {&(0x7f0000003d00)="eb4bf0c464747391c1a27be5f5c840181116c3cd3d6715e54d5d78f947187f01ff1a29ce58dfcac8616ca0d19c58e2a628aefdfdd28e507a60d97d9b443b347bad439715f085270f63c1fa", 0x4b}, {&(0x7f0000003d80)="64d517c3d6c83dc03f422f20e3d0233ef253baab1e2acab8cdc7d9e9560fb1abcd9e79b316ff8494b2f2d8b156b167928ee60f5de16616d53c2688abc6e15fabc8d78d8b3a96ab82ce3d0bd6077e09a6d9162893592b80560b4950c826eda15bdb0ebda61356d66533f03a95f9d044", 0x6f}, {&(0x7f0000003e00)="4c091005319efbd90f1d7d507d90b81995b917aa0c4d0f96028d85a8df10ad471da67baa3c810519a3de896c04f48d4b1544024b9ac48476a309605d", 0x3c}], 0x9, &(0x7f0000004000)=[@sndinfo={0x20, 0x84, 0x2, {0xffffffffffffffff, 0x200, 0xffffffffffff54cb, 0x9, r5}}, @dstaddrv4={0x18, 0x84, 0x7, @remote}, @prinfo={0x18, 0x84, 0x5, {0x10, 0x1}}], 0x50, 0x8010}, {&(0x7f0000004080)=@in6={0xa, 0x4e20, 0x3ff, @loopback, 0xfff}, 0x1c, &(0x7f00000041c0)=[{&(0x7f00000040c0)="fb1a63f9b3dc81b60e7df446586c0faa7876f3d88f9522d4c543c1744a45144018a4b73aaf41dc6d101b85378821d366549d98d1cbf8527cb8f9d555ac85fceded40859e19810ea632ccf1a6f971776210fbdfc31c8967b6e41565933b5f235ed13adbae4098326b1589c8d69c717ac5e1a1fc91a6b6813d9c7aa67cd8df7ab9deb2337a135e63b9bc6456d0a4f5fc1776c71d37d730c8625c4127423f1b271e04f304bfbd0eb20ed24e6712b7ba085c2e43c0c02e5923cbf5351cd174a93d74316eea7f6bde627a", 0xc8}], 0x1, 0x0, 0x0, 0x80}, {&(0x7f0000004200)=@in={0x2, 0x4e23, @multicast1}, 0x10, &(0x7f00000042c0)=[{&(0x7f0000004240)="b3084a1a38285c7d6d732c3fb09a2c7979f41c248105576da3ec4f7859e010ac693ac741b23ee3062755697036d711f87ccf075d4a492968ba34950bbf28dfbc7af218e7bd8a0b52f38e1dcaca9d8109dbd664d06c23a4d99e88d91ea6b184d3f14e744960159575", 0x68}], 0x1, &(0x7f0000004380)=[@dstaddrv4={0x18, 0x84, 0x7, @empty}, @prinfo={0x18, 0x84, 0x5, {0x0, 0x6}}, @sndinfo={0x20, 0x84, 0x2, {0x80, 0x0, 0x100000001, 0x1, r6}}, @authinfo={0x18, 0x84, 0x6, {0xdf10}}], 0x68, 0x4}, {&(0x7f0000004400)=@in={0x2, 0x4e22, @empty}, 0x10, &(0x7f0000005740)=[{&(0x7f0000004440)="652fd4d2fc2eebc409a7d8211c6e3972766278ada60a28ec520bc0ed7bf81504af65512d74de16002e2271553d4ec7cba38b65121e04ca9e5fbbc8689f3e066be89cb1c60ef6ae571710f85783606bae901f2125200ea545e0cd62f9ef5c5f6da786058d40f543f30f4bee3afd90ff12811851dff9c86645a87c5b4d426d52751bd735dfcfcfc98f382352a1e01b584d33c39d9c6dd1950d", 0x98}, {&(0x7f0000004500)="483d61eac0ce8d7da0901452aad357bac85a6c0cf826b2c18ae4d866374baa344ea1a11d3c57f05dcbebcdde0ac4f196d91fcb1cc9f93812967fa12d4ede2bd04a71d17b5d2a142c", 0x48}, {&(0x7f0000004580)="389de02d99e2264d83dd9186b64111be51b4ee9fb6b0feea5a71257fd84c805584945469887473edc947923a858057f91cd9048f45f2a22b146b3f", 0x3b}, {&(0x7f00000045c0)="1f1d6c38e831cfdc77e3aff91a15f98c8c983de73b0ad0b1ed6fbadc556c62028399c9ab405c4d6f1e217ba3e58f1989a688af8d0a4b8b0bb5e71a2712e6efc61a1c251b0dfe043a29b7bebcaecfc944a8681448e6130bac48b09ed261e92b089901259489693d89a6663847ab37a8aa89", 0x71}, {&(0x7f0000004640)="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", 0x1000}, {&(0x7f0000005640)="7b362f0f1e1217883e7ddea5f04e9130f7d43c580c3ca643bf0ec2a13b4ca9b42034621e2fadb63993c1731081b279f870e8992a481f44a2e4402f7be7148e40a51fd23443ea6da412ba27ae107f6f0a671cc80511cd25b1e70896518484ad41151f4b98076ccdcaf1c1324962661d7fa3249eb54549bd48afe847d5c58965cfd7e554aa28d5b582aa844605209c1ae0f00b1f018fc8ead329b0035dbcd0d7eeccc922", 0xa3}, {&(0x7f0000005700)="337b4b9b9bb577fca0bea2ef37ef93c29edd21303f55b6aa8500afa51f75cf1ac5", 0x21}], 0x7, &(0x7f0000005840)=[@sndinfo={0x20, 0x84, 0x2, {0x3, 0x0, 0x7f, 0x101, r7}}], 0x20, 0x80}], 0x9, 0x40005) r8 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r8, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r8, 0x84, 0x6c, &(0x7f0000000200)={r9, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r10 = openat$cgroup_procs(r8, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r10, &(0x7f0000000180), 0x12) 23:41:23 executing program 3: socket$bt_hidp(0x1f, 0x3, 0x6) r0 = syz_open_dev$usbmon(0x0, 0x0, 0x0) recvfrom$inet(r0, 0x0, 0xfffffffffffffef7, 0x0, 0x0, 0x0) r1 = perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x7f, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x81, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_bp={0x0}}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) sendto$inet(r0, 0x0, 0x0, 0x80, 0x0, 0x0) r2 = socket$kcm(0x10, 0x2, 0x10) sendmsg$kcm(r2, &(0x7f0000000000)={0x0, 0x0, &(0x7f0000000180)=[{&(0x7f0000000080)="2e0000002b00812de45ae087185082cf0124b0eba06ec4000500000000000019fffffffc03000000000000015b2f", 0x2e}], 0x1}, 0x0) r3 = shmget(0x1, 0x1000, 0xa08, &(0x7f0000ffe000/0x1000)=nil) stat(&(0x7f0000000180)='./file0\x00', &(0x7f0000000940)) fstat(r1, &(0x7f0000000540)) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f00000005c0)={{{@in6=@remote, @in=@remote}}, {{@in6=@dev}, 0x0, @in6=@mcast2}}, &(0x7f00000006c0)=0xe8) lstat(0x0, &(0x7f00000007c0)) getpgid(0x0) gettid() shmctl$IPC_SET(r3, 0x1, 0x0) r4 = syz_open_dev$loop(&(0x7f0000000300)='/dev/loop#\x00', 0x0, 0x0) ioctl$TIOCSCTTY(r0, 0x540e, 0x100000004) ioctl$BLKTRACETEARDOWN(r0, 0x1276, 0x0) ioctl$BLKTRACESETUP(r4, 0xc0481273, &(0x7f0000000080)={[0x40000, 0x68, 0x0, 0x0, 0x0, 0x2], 0x0, 0x400, 0x2}) setsockopt$inet6_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f0000000000)='lp\x00', 0x3) perf_event_open(&(0x7f0000000080)={0x4, 0x70, 0x0, 0x0, 0x0, 0x3ff, 0x0, 0xa, 0x2000, 0x4, 0xd00, 0x7f, 0x2, 0xfffffffffffffff8, 0x0, 0x0, 0x0, 0x648f, 0x9e69, 0x73d9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x102, 0x3, 0x0, 0x3, 0x0, 0x0, 0xffffffffffffffff, 0x4, 0x6, 0xfff, 0x4, 0x0, 0x200, 0x0, 0x80000000, 0x12000000004, @perf_bp={0x0, 0x8}, 0x100, 0x8, 0x0, 0x4, 0x0, 0x8880, 0xc1f}, 0x0, 0xe, r1, 0x0) r5 = add_key$keyring(&(0x7f0000000700)='keyring\x00', &(0x7f0000000740)={'syz', 0x3}, 0x0, 0x0, 0xfffffffffffffff8) keyctl$instantiate_iov(0x14, r5, &(0x7f0000000440), 0x0, r5) connect$bt_sco(r0, &(0x7f0000000200)={0x1f, {0x4, 0xfffffffffffffffb, 0x2, 0x6, 0x2, 0x4}}, 0x8) io_setup(0x8000000000003f, &(0x7f00000001c0)) syz_genetlink_get_family_id$ipvs(&(0x7f00000008c0)='IPVS\x00') memfd_create(&(0x7f0000000380)='IPVS\x00', 0x2) socket$inet(0x2, 0x400000005, 0x0) syz_genetlink_get_family_id$fou(&(0x7f0000000340)='fou\x00') sendmsg$FOU_CMD_GET(r0, &(0x7f0000000400)={&(0x7f00000002c0)={0x10, 0x0, 0x0, 0x40}, 0xc, &(0x7f00000003c0)={&(0x7f0000000b40)=ANY=[@ANYBLOB="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"], 0x1}, 0x1, 0x0, 0x0, 0x4c080}, 0x0) 23:41:23 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) syz_open_dev$dspn(&(0x7f0000000040)='/dev/dsp#\x00', 0x5, 0x8000) 23:41:23 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) sync_file_range(r0, 0x1, 0x2c, 0x7) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000280)=ANY=[@ANYRES32=0x0, @ANYBLOB="0400ee26aaaa3a27b7101901800900"], &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) setitimer(0x1, &(0x7f000000bfe0)={{}, {0x77359400}}, 0x0) open(&(0x7f0000000040)='./file1\x00', 0x12040, 0x22) setitimer(0x1, &(0x7f0000034000)={{}, {0x0, 0x7530}}, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:23 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:23 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1c, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000020174c9d9ceea8f63c76ec1d20cf5e732de84aaa7fdf152e9b914a83c282d5915114c91a52461d01e3a7e27668442d4000000100000000000000000000"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:23 executing program 5: r0 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xfffffffffffffe61) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r1 = syz_open_dev$amidi(&(0x7f0000000340)='/dev/amidi#\x00', 0x9, 0x670002) ioctl$EVIOCGBITSW(r1, 0x80404525, &(0x7f0000000380)=""/11) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_INFO(r0, 0xc1105511, &(0x7f0000000480)={{0x9, 0x4, 0x8, 0x7, '\x00', 0x6}, 0x5, 0x140, 0x7ff, r4, 0x8, 0x400, 'syz0\x00', &(0x7f00000002c0)=['cgroup.procs\x00', 'cgroup.procs\x00', 'cgroup.procs\x00', './cgroup.net/.yz0\x00', 'cgroup.procs\x00', 'cgroup\x00', './cgroup.net/.yz0\x00', '\x00'], 0x60, [], [0x7fff, 0xa6, 0x75bc, 0xe3]}) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000200)={r3, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000180), 0x12) 23:41:23 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffff22) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:23 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:23 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:23 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000020174c9d9ceea8f63c76ec1d20cf5e732de84aaa7fdf152e9b914a83c282d5915114c91a52461d01e3a7e27668442d4000000100000000000000000000"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:23 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) getsockopt(r0, 0x80000001, 0x1, &(0x7f0000000280)=""/243, &(0x7f0000000380)=0xf3) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:23 executing program 1: mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:23 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x1d, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000020174c9d9ceea8f63c76ec1d20cf5e732de84aaa7fdf152e9b914a83c282d5915114c91a52461d01e3a7e27668442d4000000100000000000000000000"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) fstat(r0, &(0x7f0000000200)={0x0, 0x0, 0x0, 0x0, 0x0}) syz_mount_image$xfs(&(0x7f0000000040)='xfs\x00', &(0x7f0000000080)='./file0\x00', 0x1ff, 0x1, &(0x7f00000001c0)=[{&(0x7f0000000100)="aa71186b44a8f1b578702115ceb39cdd744d5275946ac7e2d2a4425d1d8d11bc9daac5146cb788d164b3a807a195ee2161da671da06b07b875d12d37cbc6fedb5bfce3ccf4d76c6d7f53c28dffd8bc57026c769a5aedb27c5c472d540bdb8a4b20b683af414c3d5df18ab5bddc8f559315aa7b4d4f98a02ba80af030c0d90ecbcafeb7f9aedf7323", 0x88, 0x5}], 0x1000000, &(0x7f0000000300)=ANY=[@ANYBLOB='barrier,qnoenforce,swalloc,nobarrier,swidth=0x0000000000000008,noalign,fowner=', @ANYRESDEC=r3, @ANYBLOB=',6']) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) bpf$BPF_PROG_DETACH(0x9, &(0x7f0000000280)={0x0, r0, 0x0, 0x1}, 0x14) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:24 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) getsockopt(r0, 0x80000001, 0x1, &(0x7f0000000280)=""/243, &(0x7f0000000380)=0xf3) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:24 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x21, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:24 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x376) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="040001be7b32000900"], &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) ioctl$VT_RESIZE(r0, 0x5609, &(0x7f0000000280)={0x4, 0x7, 0x44e5}) 23:41:24 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:24 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r3 = syz_open_dev$amidi(&(0x7f0000000080)='/dev/amidi#\x00', 0x3, 0x101100) ioctl$UI_BEGIN_FF_UPLOAD(r3, 0xc06855c8, &(0x7f0000000180)={0x10, 0x5, {0x53, 0x40, 0x1, {0x4, 0x7}, {0xffffffff, 0x8}, @period={0x59, 0x6, 0x6, 0x4, 0x2, {0x20, 0x7, 0x2, 0x5}, 0x6, &(0x7f0000000140)=[0x1ff, 0x3, 0xffffffffffffff44, 0x5, 0x8, 0x6]}}, {0x54, 0xa16, 0x5, {0x100, 0xffff}, {0xa8, 0xfffffffffffffffa}, @rumble={0x3, 0x2f7}}}) ioctl$UI_GET_VERSION(r3, 0x8004552d, &(0x7f0000000100)) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:24 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000040)={0x2, 0x2, 0xf000, 0x2000, &(0x7f0000027000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000240)='/dev/bus/usb/00#/00#\x00', 0x1, 0x10080) getsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(0xffffffffffffff9c, 0x84, 0xa, &(0x7f0000000280)={0x2, 0x100000000, 0x200, 0x6, 0x0, 0x100000001, 0x3, 0x1ff, 0x0}, &(0x7f0000000300)=0x20) setsockopt$inet_sctp6_SCTP_DEFAULT_SNDINFO(r3, 0x84, 0x22, &(0x7f0000000340)={0x6, 0x8002, 0x1ff, 0x8, r4}, 0x10) 23:41:24 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:24 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x24, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:24 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d59151146ca29cf4af60bfec80c91a52461d1de3a7e2766844659c067f0e41"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000280)={0x5}, 0x1) 23:41:24 executing program 1: clone(0x0, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:24 executing program 5: rt_sigaction(0x39, &(0x7f00000003c0)={&(0x7f0000000340)="0fac88008000000c2e47d9f66442d9d0c4c10961a9e7000000266564660fe569fff2afc4c2152d0eda5600c4e3f9682a08c401f91032", {0x5}, 0x10000006, &(0x7f0000000380)="da226546d9fa45c0ee11c4627d19e7450f01d88f8978c2b6c5851eedf30f2d0740cfc4226d2e7fb2c4837d39992a95022013"}, &(0x7f00000004c0)={&(0x7f0000000400)="c401ee11e7c4a11ddad6c4c3790556acf865460ff8eb66642e652e41d9844300000021c42261bd17460feed9dae91dbe000000660f2a14ba", {}, 0x0, &(0x7f0000000480)="c4c1e8584300c4e270f3dbc441fc535500c4627d176c9117660f38df80d1025e81c4e17c77c441f95a430ec401fb2d460047d2f126e300"}, 0x8, &(0x7f0000000500)) perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x9, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext, 0x0, 0x0, 0x0, 0x0, 0x6b}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) fcntl$F_GET_RW_HINT(r0, 0x40b, &(0x7f0000000200)) accept$inet6(r0, &(0x7f0000000240), &(0x7f0000000300)=0x1c) r2 = syz_genetlink_get_family_id$SEG6(&(0x7f0000000580)='SEG6\x00') sendmsg$SEG6_CMD_GET_TUNSRC(r0, &(0x7f0000000640)={&(0x7f0000000540)={0x10, 0x0, 0x0, 0x2000000}, 0xc, &(0x7f0000000600)={&(0x7f00000005c0)={0x1c, r2, 0x300, 0x70bd29, 0x25dfdbfe, {}, [@SEG6_ATTR_DSTLEN={0x8, 0x2, 0x4}]}, 0x1c}, 0x1, 0x0, 0x0, 0x44000}, 0x44004) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e737252fb914ab76f82d5915114c91a52461d01e3a7e2766844659c067f0e410ba84e5c6043b32d40000000000000"}, 0x0) r3 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = dup2(r1, r0) ioctl$VIDIOC_ENUM_FRAMESIZES(r2, 0xc02c564a, &(0x7f00000000c0)={0x6, 0x35365d5b, 0x2, @discrete={0xfffffffffffffffe, 0xdb9}}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) r4 = syz_open_dev$dmmidi(&(0x7f0000000040)='/dev/dmmidi#\x00', 0x40, 0x113000) ioctl$FS_IOC_GETFSMAP(r1, 0xc0c0583b, &(0x7f0000000300)={0x0, 0x0, 0x0, 0x0, [], [{0x3, 0xc4c8, 0x3, 0xba86, 0x40, 0x8}, {0x3, 0x1000, 0x3, 0x101, 0x7, 0x800}]}) write$RDMA_USER_CM_CMD_CREATE_ID(0xffffffffffffff9c, &(0x7f0000000100)={0x0, 0x18, 0xfa00, {0x1, &(0x7f0000000080)={0xffffffffffffffff}, 0x111, 0x100f}}, 0x20) write$RDMA_USER_CM_CMD_REJECT(r4, &(0x7f0000000140)={0x9, 0x108, 0xfa00, {r5, 0x12, "3d66f2", "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"}}, 0x110) 23:41:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d59151146ca29cf4af60bfec80c91a52461d1de3a7e2766844659c067f0e41"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000280)={0x5}, 0x1) 23:41:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="14000000174c9d9ceea8f63c76d87520cf6a19d314603796ba152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:25 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d59151146ca29cf4af60bfec80c91a52461d1de3a7e2766844659c067f0e41"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) setsockopt$inet_sctp_SCTP_AUTH_CHUNK(r0, 0x84, 0x15, &(0x7f0000000280)={0x5}, 0x1) 23:41:25 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000ea6fe7091855bd696f5afc23b10ca82ba1c607b2ae7c6ea82aa6b01a732fcb5090db9679decb598dd4dbf2d4721a01da12182d553d03fcb76190cac03bf3621de7e55bd63ec668cd08fa362747e50fdfd6cad2e445c87ab7aaaf14ef9ec0cabff3dc456b24d994d69fd685c0a9389bde49921d916b55eba4f4"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:25 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x25, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:25 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) setsockopt$inet_sctp_SCTP_AUTO_ASCONF(r0, 0x84, 0x1e, &(0x7f0000000280)=0x3f, 0x4) 23:41:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:25 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) socket$nl_crypto(0x10, 0x3, 0x15) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="14000000174c9d9ceea8f63c76d87520cf6a19d314603796ba152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:25 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(0x0, 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:25 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xfffffffffffffe11) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) r0 = openat$proc_capi20ncci(0xffffffffffffff9c, &(0x7f0000000340)='/proc/capi/capi20ncci\x00', 0x8000, 0x0) recvfrom$unix(r0, &(0x7f0000000380)=""/174, 0xae, 0x42, &(0x7f0000000480)=@abs={0x1, 0x0, 0x4e24}, 0x6e) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$KDADDIO(r0, 0x4b34, 0x5a36) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) accept4(r1, &(0x7f0000000280)=@pppoe={0x18, 0x0, {0x0, @link_local}}, &(0x7f0000000300)=0x80, 0x800) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:25 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x4) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000001400)={0x0, 0x0, 0x0, 0x1000, &(0x7f000003e000/0x1000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0xffffffffffffff41) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x200000, 0x0) lstat(&(0x7f0000000200)='./file0\x00', &(0x7f0000001300)={0x0, 0x0, 0x0, 0x0, 0x0}) setfsuid(r4) connect$inet(r3, &(0x7f0000000240)={0x2, 0x4e20, @initdev={0xac, 0x1e, 0x1, 0x0}}, 0x10) getsockopt$TIPC_SRC_DROPPABLE(r3, 0x10f, 0x80, &(0x7f0000001380), &(0x7f00000013c0)=0x4) r5 = syz_open_dev$vcsn(&(0x7f0000000080)='/dev/vcs#\x00', 0x7, 0x40000) ioctl$EVIOCGABS20(r3, 0x80184560, &(0x7f0000000300)=""/4096) ioctl$KVM_NMI(r5, 0xae9a) ioctl$sock_bt_bnep_BNEPCONNADD(r3, 0x400442c8, &(0x7f0000000100)={r5, 0x7, 0x7cfdfd48, "09b4d5942b9f9452008640d819b89dba14e07cb954ee63e827e36927d1cec4e5b79971752c90df0eadfedad05ddb526bf1fdf92877f61fb469fda81eb8661c62ff4402a027ea444b2647961896e22fa69469879cbd46106b7571826c0906dda33fcd3c8d754e57e73f28b683568befb220a4316c13fb4fab7a6be34b4e606e692c4ded7ec997d9127b5b332e37dc6efaee8f9614927cfb3de9f606541e5caea2638b48d35cd224be01bb9d81fb7ad94ca9f23a552f8fbc47a7d5bc8f4c20fce9a0b5d80681b02d59bc4a2616d6a7ab8b8bd6aab8675a8766bae3c412"}) syz_open_dev$media(&(0x7f0000000280)='/dev/media#\x00', 0x0, 0x180) socket$netlink(0x10, 0x3, 0x1b) 23:41:26 executing program 3: 23:41:26 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x28, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) socket$packet(0x11, 0x3, 0x300) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cfbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e276a18036bd5e2dffb00be84e5c6043b32d40"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) syz_open_dev$rtc(&(0x7f0000000240)='/dev/rtc#\x00', 0x550a, 0x4002) 23:41:26 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:26 executing program 3: 23:41:26 executing program 3: 23:41:26 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) clock_gettime(0x4, &(0x7f0000000380)) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$vsock(0xffffffffffffff9c, &(0x7f0000000280)='/dev/vsock\x00', 0x80, 0x0) accept$unix(r0, &(0x7f00000002c0)=@abs, &(0x7f0000000340)=0x6e) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp_SCTP_PR_ASSOC_STATUS(r1, 0x84, 0x73, &(0x7f00000003c0)={0x0, 0x8, 0x0, 0x3, 0x401}, &(0x7f0000000400)=0x18) setsockopt$inet_sctp6_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000480)={0x2, 0x0, 0x2, 0x9, 0xfa, 0x2, 0x0, 0x4, r2}, 0x20) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r3, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r4 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000180), 0x12) 23:41:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) r3 = openat$dlm_control(0xffffffffffffff9c, &(0x7f0000000040)='/dev/dlm-control\x00', 0x0, 0x0) ioctl$sock_SIOCGIFINDEX(0xffffffffffffff9c, 0x8933, &(0x7f0000000300)={'rose0\x00', 0x0}) setsockopt$inet6_mreq(r3, 0x29, 0x14, &(0x7f0000000340)={@remote, r4}, 0x14) 23:41:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:26 executing program 3: 23:41:26 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x2c, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:26 executing program 3: 23:41:26 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:26 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000540)='/dev/dlm-monitor\x00', 0x4000, 0x0) ioctl$TIOCOUTQ(r0, 0x5411, &(0x7f00000005c0)) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)=ANY=[@ANYRES32=0x0, @ANYBLOB="040bebff0800"], &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="3c000000174c9d9c070a000000000000005e73724fbe3ccb0e5e0ed4a84a83c282d5915114c91a52467f0e410be84e5c6043b32d00"], 0x0) openat$ubi_ctrl(0xffffffffffffff9c, &(0x7f0000000240)='/dev/ubi_ctrl\x00', 0x20080, 0x0) socket$bt_hidp(0x1f, 0x3, 0x6) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) syz_mount_image$reiserfs(&(0x7f0000000280)='reiserfs\x00', &(0x7f00000002c0)='./file0\x00', 0xffffffffffffff7f, 0x2, &(0x7f0000000480)=[{&(0x7f0000000300)="cc5c9f9e8d8a3ad58f7a8b70cb204362c295e3b290270c0ca3c06fc02fe8d92e677ae8d2bcb8a55ce5274362d715722112586a86a4296a7ce099aa11bdd742952a1f681c7b04652b5e48b336c6800786681c6b2f95f34933dbb88ce3bd623b8f3864357979389781abfc27077fbc8e3ef2a750e55f07fd98919184e54b867479817d4d4356379c83827f5f5193fa3a9ba14ae240d8ff33e5a23c549bd9d06126f10b8826084b196b018e4963c6638229fbb149eb06ee1acd3581a4d1c7026cccaa6f86131b52ea1a5c8d95cf3670ebd0e49c5a1b643d384ad88e9b09d559797cce7b60a7a4b0132a31cb715461b83bd21180a80c067a4520", 0xf8}, {&(0x7f0000000400)="41ecffbab4b7a5da81cae9d7bf5a42c5bc7ca7d97bbaad816950d442ddd37335fc4f6c16a6a3ab09d7305051577c", 0x2e, 0x3}], 0x280400c, &(0x7f00000004c0)={[{@tails_off='tails=off'}, {@nouser_xattr='nouser_xattr'}], [{@func={'func', 0x3d, 'PATH_CHECK'}}, {@dont_hash='dont_hash'}, {@smackfsroot={'smackfsroot', 0x3d, './cgroup.net/.yz0\x00'}}, {@mask={'mask', 0x3d, '^MAY_READ'}}]}) fcntl$getown(r3, 0x9) ioctl$TIOCMBIC(r0, 0x5417, &(0x7f0000000580)=0x20) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:26 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x0, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:26 executing program 3: 23:41:26 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000180)=ANY=[@ANYBLOB="0000aa6a8ea68d27063418114667995db63bb36e2fe055be8c8f00a5fdd30be76a4d6f6ce5832857000000000000000000000000000000000000794d242904063b4b52f34f478e810ff22a99240428022baf499ab9e7f261a31a16c22b63c8e541e73a047a3c222c9e4ea08e46dbab25050de99f229f6542169054bc03ca0ac8c3443bae848b8c96a59a2347"]) ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x2) socketpair(0x0, 0x7, 0x200, &(0x7f0000000040)) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:27 executing program 3: 23:41:27 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 576.896031] REISERFS warning (device loop5): super-6502 reiserfs_getopt: unknown mount option "func=PATH_CHECK" 23:41:27 executing program 3: 23:41:27 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x2d, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = openat$dlm_monitor(0xffffffffffffff9c, &(0x7f0000000280)='/dev/dlm-monitor\x00', 0x80, 0x0) getdents64(r0, &(0x7f00000002c0)=""/252, 0xfc) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) fcntl$getown(r0, 0x9) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="3c00118e40d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f4000000000000000b32d400000000000000000"], 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:27 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:27 executing program 3: 23:41:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:27 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(0x0, 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:27 executing program 3: 23:41:27 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f0000000280)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:27 executing program 3: 23:41:27 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = openat$zero(0xffffffffffffff9c, &(0x7f0000000040)='/dev/zero\x00', 0x80000, 0x0) getsockopt$inet6_IPV6_XFRM_POLICY(r0, 0x29, 0x23, &(0x7f0000000100)={{{@in6=@remote, @in6=@initdev, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@loopback}, 0x0, @in6=@mcast1}}, &(0x7f0000000080)=0xe8) stat(&(0x7f0000000200)='./file0\x00', &(0x7f0000000240)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) getsockopt$inet6_IPV6_IPSEC_POLICY(0xffffffffffffffff, 0x29, 0x22, &(0x7f0000000300)={{{@in6=@local, @in=@remote, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@local}, 0x0, @in=@multicast1}}, &(0x7f0000000400)=0xe8) write$P9_RSTATu(r2, &(0x7f0000000440)={0x72, 0x7d, 0x2, {{0x0, 0x54, 0x8001, 0x0, {0x12, 0x0, 0x3}, 0x80000, 0x5, 0x3f, 0x7, 0x9, '/dev/kvm\x00', 0x6, '[!-GPL', 0x9, '/dev/kvm\x00', 0x9, '/dev/kvm\x00'}, 0x9, '/dev/kvm\x00', r3, r4, r5}}, 0x72) r6 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r6, 0xae80, 0x0) 23:41:27 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x30, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:27 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:27 executing program 3: 23:41:27 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:27 executing program 5: r0 = syz_open_dev$sndpcmc(&(0x7f0000000200)='/dev/snd/pcmC#D#c\x00', 0x20, 0x90700) getsockopt$inet_sctp6_SCTP_PARTIAL_DELIVERY_POINT(0xffffffffffffff9c, 0x84, 0x13, &(0x7f0000000240)={0x0, 0xffffffff}, &(0x7f00000003c0)=0x8) getsockopt$inet_sctp_SCTP_DEFAULT_SEND_PARAM(r0, 0x84, 0xa, &(0x7f0000000400)={0x6, 0xd9, 0x8, 0x3, 0x4, 0x1, 0xf0de, 0x0, r1}, &(0x7f0000000480)=0x20) r2 = perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) ioctl$sock_SIOCGPGRP(r2, 0x8904, &(0x7f0000000280)=0x0) prlimit64(r3, 0xd, &(0x7f00000002c0)={0xfffffffffffffff7, 0x5}, &(0x7f0000000300)) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0xfffffffffffffd9e) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r4 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r4, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r4, 0x84, 0x6c, &(0x7f0000000340)=ANY=[@ANYRES32=r5, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40ede9a7dde94595b62e6763519dba38c8ceeaeac450adaea1e2"], 0x0) r6 = openat$cgroup_procs(r4, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r6, &(0x7f0000000180), 0x12) 23:41:28 executing program 3: 23:41:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:28 executing program 3: r0 = syz_open_procfs(0x0, &(0x7f0000000300)='net/fib_trie\x00') perf_event_open(&(0x7f0000000140)={0x2, 0x70, 0x3e7, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) r1 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TCSETS(r1, 0x40045431, &(0x7f00003b9fdc)) r2 = syz_open_pts(r1, 0x0) dup3(r2, r0, 0x0) 23:41:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000240)='./file0\x00', 0x0, 0x100010, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000300)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d875202e9b914a83c282d5915114c91a52461d010700e2766844659c067f0e410be84e5c6043b32c407adbcd4ef8719aed0b6b05a5b7c1f3a73eba221d9e8b4fd47cad93fe2b5bddbb92b38d4ad2a49fbd7b70055e6527e4203a318f97277b556dfc24bcc82bb24f5963118044e8521f00000000000000ed09f7800a182846d04bc5a67417f10816e288be9ddee773ec310b34dc0000000000000000689b116462e02e8492c3bd72a3b5e28703d38d5bf18bcfc6198a993685368ff6da"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:28 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:28 executing program 0: openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r0 = ioctl$KVM_CREATE_VCPU(0xffffffffffffffff, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(0xffffffffffffffff, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB='\x00\x00hO1p\b\x00']) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r0, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) ioctl$KVM_RUN(r0, 0xae80, 0x0) 23:41:28 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x34, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x40, 0x101a40) ioctl$EVIOCGREP(r0, 0x80084503, &(0x7f00000002c0)=""/131) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:28 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) r3 = syz_open_dev$usb(&(0x7f0000000040)='/dev/bus/usb/00#/00#\x00', 0x5, 0x420100) ioctl$VIDIOC_REQBUFS(r3, 0xc0145608, &(0x7f0000000080)={0xffffffffffffffe1, 0xd, 0x4}) ioctl$BLKRRPART(r3, 0x125f, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:28 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000140)=ANY=[@ANYBLOB="00cc"]) pipe2(&(0x7f0000000040), 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0x0, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:28 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, 0x0, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:28 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x86) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = openat$ipvs(0xffffffffffffff9c, &(0x7f0000000280)='/proc/sys/net/ipv4/vs/sync_threshold\x00', 0x2, 0x0) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, 0x0) getsockopt$inet_sctp_SCTP_STREAM_SCHEDULER_VALUE(r0, 0x84, 0x7c, &(0x7f0000000300)={0x0, 0x4, 0xcb}, &(0x7f0000000340)=0x8) getsockopt$inet_sctp6_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000380)={r1, 0xa3, "6041d05d7005eec083bc969b9c8cd61e8602742e79a84602d7794d9fb45582990ce4b37810b2f07a5987e05c21041c00312297a5ceeb82a5f36660ffedadbda27db5c02eb58a9a7b3d94fe743b7bf1b86a562342ce2a2ba4390f466719814fb7aba01cbed0c39cd23da1f1fd99ccd26bd4a9684b3d30d490859b2a03f46c56ab9b5c2d0ac6b4abf96d60773d617287854330c4959966885d8ba52b9bf31e1272c08b47"}, &(0x7f0000000480)=0xab) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) ioctl$sock_inet_SIOCGIFPFLAGS(r0, 0x8935, &(0x7f00000002c0)={'veth1_to_bond\x00', 0xffffffffffff0000}) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r3, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e8b914a83c282d5915114c91a52461d01e3a7e25a68443b1c067f0e410be84e5c6043b32d40"], 0x0) r4 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000180), 0x12) 23:41:28 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x35, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:28 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:28 executing program 3: r0 = socket$inet(0x2, 0x4000000000000001, 0x0) bind$inet(r0, &(0x7f0000000080)={0x2, 0x4e23, @broadcast}, 0x10) sendto$inet(r0, 0x0, 0x0, 0x400200007fe, &(0x7f00000002c0)={0x2, 0x10084e23, @local}, 0x10) write$binfmt_elf64(r0, &(0x7f00000016c0)=ANY=[@ANYRES64, @ANYRESDEC, @ANYRES16], 0xffffffe6) setsockopt$inet_tcp_TCP_CONGESTION(r0, 0x6, 0xd, &(0x7f00000013c0)='lp\x00', 0x3) recvmsg(r0, &(0x7f0000000240)={&(0x7f0000000000)=@nfc, 0x9005, &(0x7f00000001c0)=[{&(0x7f0000003ac0)=""/4096, 0x20013a5a}], 0x1, &(0x7f0000000200)=""/20, 0x811e}, 0x0) 23:41:29 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040), &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) r3 = socket$xdp(0x2c, 0x3, 0x0) setsockopt$XDP_UMEM_REG(r3, 0x11b, 0x4, &(0x7f0000000040)={0x0, 0x2000, 0x800, 0x400000}, 0x8) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_SOCKOPT_BINDX_REM(r1, 0x84, 0x65, &(0x7f0000000100)=[@in={0x2, 0x4e23, @broadcast}, @in6={0xa, 0x4e21, 0x100000, @dev={0xfe, 0x80, [], 0xe}, 0x7f}, @in6={0xa, 0x4e21, 0x8, @ipv4={[], [], @rand_addr=0x10000}, 0x9}, @in={0x2, 0x4e24, @multicast2}], 0x58) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000900174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5910800c91a52461d01e3a7e2766844659cb1dadc067f0e410be84e5c604370453a22d52cf0f48bfe77acdea364d100388e5d3d2b776823131513b1c6f8151bf42dc25705ab03c8377d4d1ce51d078ec366cb248474a1b1d07e89cee01a481703c404afbf10de2148"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:29 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x3c, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) pipe(&(0x7f0000000280)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) getsockopt$inet_mreqn(r0, 0x0, 0x23, &(0x7f00000004c0)={@local, @initdev, 0x0}, &(0x7f0000000500)=0xc) setsockopt$packet_drop_memb(r0, 0x107, 0x2, &(0x7f0000000540)={r1, 0x1, 0x6, @remote}, 0x10) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) io_setup(0x9, &(0x7f00000002c0)=0x0) io_pgetevents(r3, 0x401, 0x5, &(0x7f0000000300)=[{}, {}, {}, {}, {}], &(0x7f00000003c0)={0x77359400}, &(0x7f0000000480)={&(0x7f0000000400)={0x5}, 0x8}) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) openat$smack_thread_current(0xffffffffffffff9c, &(0x7f0000000580)='/proc/thread-self/attr/current\x00', 0x2, 0x0) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000200)={r4, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r5 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r5, &(0x7f0000000180), 0x12) 23:41:29 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040), &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) get_mempolicy(&(0x7f0000000040), &(0x7f0000000080), 0x7ff, &(0x7f0000030000/0x1000)=nil, 0x1) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) r0 = syz_open_dev$dmmidi(&(0x7f0000000280)='/dev/dmmidi#\x00', 0x9, 0x24080) getsockopt$inet_pktinfo(0xffffffffffffffff, 0x0, 0x8, &(0x7f0000000400)={0x0, @dev, @broadcast}, &(0x7f0000000480)=0xc) recvfrom$packet(r0, &(0x7f00000002c0)=""/40, 0x28, 0x40000000, &(0x7f00000004c0)={0x11, 0x10, r1, 0x1, 0x6}, 0x14) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r2 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r2, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r2, 0x84, 0x6c, &(0x7f0000000200)={r3, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r4 = openat$cgroup_procs(r2, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r4, &(0x7f0000000180), 0x12) 23:41:29 executing program 3: r0 = openat$ptmx(0xffffffffffffff9c, &(0x7f0000000040)='/dev/ptmx\x00', 0x0, 0x0) ioctl$TIOCSETD(r0, 0x5423, &(0x7f0000000380)=0x3) read(r0, 0x0, 0x0) 23:41:29 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x3d, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:29 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:29 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040), &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:29 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) ioctl$KVM_SMI(r2, 0xaeb7) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x101000, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) ioctl$KVM_SET_GUEST_DEBUG(r2, 0x4048ae9b, &(0x7f0000000040)={0x40000, 0x0, [0x7, 0x1, 0x5, 0x20, 0xacd, 0x0, 0xff, 0x5]}) 23:41:29 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f00000002c0)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) r3 = inotify_add_watch(r0, &(0x7f0000000280)='./file0\x00', 0x4) inotify_rm_watch(r0, r3) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:30 executing program 3: socketpair$unix(0x1, 0x2, 0x0, &(0x7f00000000c0)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r0, 0x8912, 0x400200) r1 = openat$tun(0xffffffffffffff9c, &(0x7f0000000140)='/dev/net/tun\x00', 0x0, 0x0) ioctl$TUNSETIFF(r1, 0x400454ca, &(0x7f00000005c0)={'vlan0\x00', 0xd803}) 23:41:30 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:30 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x44, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="0000ea6fe7191855f485894dbbe6075e3ae3c4f340c668d1654f7cdf00000000000053ef145963057216f2e7ab01463f7114628aba2b00000000000000000000000000000000000000000000000000000000"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) 23:41:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:30 executing program 3: r0 = socket$inet_udplite(0x2, 0x2, 0x88) ioctl(r0, 0x1000008912, &(0x7f0000000040)="0adc1f123c12a41d88b070") bpf$PROG_LOAD(0x5, &(0x7f0000000100)={0x1, 0x3, &(0x7f0000001fd8)=ANY=[@ANYBLOB="b700000000000000650000000000001e9500000000000000"], 0x0}, 0x48) 23:41:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = shmget$private(0x0, 0x3000, 0x420, &(0x7f0000ffc000/0x3000)=nil) shmctl$IPC_STAT(r0, 0x2, &(0x7f0000000280)=""/181) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000340)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:30 executing program 3: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) socket$isdn(0x22, 0x3, 0x0) openat$ipvs(0xffffffffffffff9c, 0x0, 0x2, 0x0) recvmmsg(0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) 23:41:30 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:30 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x45, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:30 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = syz_open_dev$cec(&(0x7f00000001c0)='/dev/cec#\x00', 0x3, 0x2) inotify_add_watch(r2, &(0x7f0000000200)='./file0\x00', 0x80) ioctl$KVM_GET_PIT2(r1, 0x8070ae9f, &(0x7f00000000c0)) r3 = syz_open_dev$cec(&(0x7f0000000140)='/dev/cec#\x00', 0x2, 0x2) getsockopt$inet6_tcp_int(r3, 0x6, 0xe, &(0x7f0000000300), &(0x7f0000000280)=0x4) r4 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f0000000180)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f0000000040)=ANY=[@ANYBLOB="e65face45eb77b2bab6ce6c930b3332e2f705723e1b0929605fb8ead80558eed40fd4d00d77136192ed7fe7c07a95e66d47f6cc9cdb9e120330ddbb8e02dc00ccf428191f54d6a58a727b27c423ef374344f10f61079a7cc4f3b9a367852117572c3a7d65ac90baab95a17b5f150952bdb2df88ae1fd341d62cabe"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r4, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r4, 0xae80, 0x0) 23:41:30 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = socket$inet_udp(0x2, 0x2, 0x0) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x3, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_REGISTER_COALESCED_MMIO(r1, 0x4010ae67, &(0x7f0000000100)={0x0, 0x100000}) pselect6(0x40, &(0x7f0000000040)={0x0, 0x0, 0xb1c9}, 0x0, 0x0, 0x0, 0x0) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, &(0x7f0000000140)=[@textreal={0x8, 0x0}], 0x1, 0x0, 0x0, 0x0) ioctl$KVM_NMI(r3, 0xae9a) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:41:30 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = openat$vfio(0xffffffffffffff9c, &(0x7f00000002c0)='/dev/vfio/vfio\x00', 0x440, 0x0) ioctl$FIONREAD(r0, 0x541b, &(0x7f0000000300)) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)={r2, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) r4 = socket$inet_udplite(0x2, 0x2, 0x88) setsockopt$inet_udp_encap(r4, 0x11, 0x64, &(0x7f0000000280)=0x7, 0x4) 23:41:30 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:31 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, 0x0) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) r0 = syz_open_dev$dspn(&(0x7f0000000280)='/dev/dsp#\x00', 0x1, 0xa00) ioctl$KVM_ENABLE_CAP(r0, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000200)=ANY=[@ANYRES32=r2, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c2a7e2766844659c067f0e410be84e5c6043b32d40000000000000000000000000"], 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) sysfs$3(0x3) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) 23:41:31 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) fchdir(r2) r3 = syz_open_dev$usbmon(&(0x7f0000000040)='/dev/usbmon#\x00', 0x2, 0x100) getsockopt$bt_BT_RCVMTU(r3, 0x112, 0xd, &(0x7f0000000080)=0x3, &(0x7f0000000100)=0x2) [ 581.097733] [ 581.099409] ====================================================== [ 581.105901] WARNING: possible circular locking dependency detected [ 581.107318] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 581.112247] 5.0.0+ #7 Not tainted [ 581.112253] ------------------------------------------------------ [ 581.112262] syz-executor.4/32126 is trying to acquire lock: [ 581.112269] 000000004930e2aa (&mm->mmap_sem){++++}, at: __do_page_fault+0x9c2/0xd60 [ 581.112383] [ 581.112383] but task is already holding lock: 23:41:31 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f00000002c0)=ANY=[@ANYRES32=0x0, @ANYBLOB="040019000900d76e336134378fce2f79ee00eeb1aad6a2141a2766324b014b6086bb0e5c14caed73374bafaa11718f95051f3503600f2e1ca31d309201c02f9e6712e3a2fa76bfd1a9c120755482af2f8761c2da3e216e3319d83600db2b5ec6a567d5783e504391b88eec5a309f0400000000000000fdc4c00ac32efa40421e4f5311caf4df5cc5cbf1cd3552846724b92b5cbc3b57b91d45fbe18ec6071826d821376e58f46774fa41ccea18399d9a139f3ae7cdd7c5b7b71a259657bd55f3882585"], &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f00000003c0), 0x12) ioctl$UI_SET_PHYS(r0, 0x4008556c, &(0x7f0000000280)='syz0\x00') [ 581.141114] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 581.142027] 000000004a34dad7 (&sb->s_type->i_mutex_key#11){+.+.}, at: generic_file_write_iter+0xdf/0x610 [ 581.142123] [ 581.142123] which lock already depends on the new lock. [ 581.142123] [ 581.175537] [ 581.175537] the existing dependency chain (in reverse order) is: [ 581.183150] [ 581.183150] -> #2 (&sb->s_type->i_mutex_key#11){+.+.}: [ 581.189926] down_write+0x38/0x90 [ 581.193912] shmem_fallocate+0x15a/0xc60 23:41:31 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 581.198597] ashmem_shrink_scan+0x1d7/0x4f0 [ 581.203455] ashmem_ioctl+0x2f0/0x11a0 [ 581.207955] do_vfs_ioctl+0xd6e/0x1390 [ 581.212364] ksys_ioctl+0xab/0xd0 [ 581.216334] __x64_sys_ioctl+0x73/0xb0 [ 581.220739] do_syscall_64+0x103/0x610 [ 581.225137] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.230826] [ 581.230826] -> #1 (ashmem_mutex){+.+.}: [ 581.236277] __mutex_lock+0xf7/0x1310 [ 581.240589] mutex_lock_nested+0x16/0x20 [ 581.245164] ashmem_mmap+0x55/0x520 [ 581.249296] mmap_region+0xc37/0x1760 [ 581.253601] do_mmap+0x8e2/0x1080 [ 581.257569] vm_mmap_pgoff+0x1c5/0x230 [ 581.261980] ksys_mmap_pgoff+0x4aa/0x630 [ 581.266625] __x64_sys_mmap+0xe9/0x1b0 [ 581.271044] do_syscall_64+0x103/0x610 [ 581.275459] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.281187] [ 581.281187] -> #0 (&mm->mmap_sem){++++}: [ 581.286750] lock_acquire+0x16f/0x3f0 [ 581.291077] down_read+0x3b/0x90 [ 581.294976] __do_page_fault+0x9c2/0xd60 [ 581.299540] do_page_fault+0x71/0x581 [ 581.303842] page_fault+0x1e/0x30 [ 581.307799] iov_iter_fault_in_readable+0x1ba/0x450 [ 581.313318] generic_perform_write+0x195/0x530 [ 581.318403] __generic_file_write_iter+0x25e/0x630 [ 581.323841] generic_file_write_iter+0x360/0x610 [ 581.329100] __vfs_write+0x613/0x8e0 [ 581.333315] vfs_write+0x20c/0x580 [ 581.337356] ksys_write+0xea/0x1f0 [ 581.341399] __x64_sys_write+0x73/0xb0 [ 581.345792] do_syscall_64+0x103/0x610 [ 581.350419] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.356108] [ 581.356108] other info that might help us debug this: [ 581.356108] [ 581.364224] Chain exists of: [ 581.364224] &mm->mmap_sem --> ashmem_mutex --> &sb->s_type->i_mutex_key#11 [ 581.364224] [ 581.375761] Possible unsafe locking scenario: [ 581.375761] [ 581.381837] CPU0 CPU1 [ 581.386570] ---- ---- [ 581.391233] lock(&sb->s_type->i_mutex_key#11); [ 581.395977] lock(ashmem_mutex); [ 581.401940] lock(&sb->s_type->i_mutex_key#11); [ 581.409212] lock(&mm->mmap_sem); [ 581.412770] [ 581.412770] *** DEADLOCK *** [ 581.412770] [ 581.418811] 2 locks held by syz-executor.4/32126: [ 581.423631] #0: 00000000c2a4aa3a (sb_writers#5){.+.+}, at: vfs_write+0x429/0x580 [ 581.431288] #1: 000000004a34dad7 (&sb->s_type->i_mutex_key#11){+.+.}, at: generic_file_write_iter+0xdf/0x610 [ 581.441358] [ 581.441358] stack backtrace: [ 581.445858] CPU: 0 PID: 32126 Comm: syz-executor.4 Not tainted 5.0.0+ #7 [ 581.452684] Hardware name: Google Google Compute Engine/Google Compute Engine, BIOS Google 01/01/2011 [ 581.462907] Call Trace: [ 581.465489] dump_stack+0x172/0x1f0 [ 581.469112] print_circular_bug.isra.0.cold+0x1cc/0x28f [ 581.474473] __lock_acquire+0x2f00/0x4700 [ 581.478604] ? mark_held_locks+0x100/0x100 [ 581.482845] ? mark_held_locks+0x100/0x100 [ 581.487064] ? __lock_is_held+0xb6/0x140 [ 581.491110] lock_acquire+0x16f/0x3f0 [ 581.494898] ? __do_page_fault+0x9c2/0xd60 [ 581.499119] down_read+0x3b/0x90 [ 581.502473] ? __do_page_fault+0x9c2/0xd60 [ 581.506698] __do_page_fault+0x9c2/0xd60 [ 581.510762] do_page_fault+0x71/0x581 [ 581.514559] page_fault+0x1e/0x30 [ 581.518008] RIP: 0010:iov_iter_fault_in_readable+0x1ba/0x450 [ 581.523787] Code: 4c 39 f3 76 17 eb 3b e8 f4 bb 46 fe 48 81 c3 00 10 00 00 48 39 9d 68 ff ff ff 72 2d e8 df bb 46 fe 0f 1f 00 0f ae e8 45 31 f6 <8a> 13 0f 1f 00 31 ff 44 89 f6 41 88 57 d0 e8 43 bd 46 fe 45 85 f6 [ 581.542685] RSP: 0018:ffff88808d62f9b8 EFLAGS: 00010246 [ 581.548039] RAX: 0000000000040000 RBX: 0000000020000040 RCX: ffffc90012aa1000 [ 581.555289] RDX: 00000000000000b2 RSI: ffffffff832928a1 RDI: 0000000000000005 [ 581.562547] RBP: ffff88808d62fa58 R08: ffff88809489c280 R09: ffff88809489cb48 [ 581.564236] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 581.569811] R10: 0000000000000000 R11: 0000000000000000 R12: 0000000000000002 [ 581.569823] R13: 0000000000000002 R14: 0000000000000000 R15: ffff88808d62fa30 [ 581.583930] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:31 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) r3 = openat$qat_adf_ctl(0xffffffffffffff9c, &(0x7f0000000040)='/dev/qat_adf_ctl\x00', 0x81, 0x0) write$nbd(r3, &(0x7f0000000300)={0x67446698, 0xf4, 0x1, 0x1, 0x1, "a7173d137c635862b6f1315c6fd220d0d41ce356ddfabf5ffc7d08cf52a7448e3a839b7d43cc719a84e6c2adf0d492a054688d2d7a97329c8baa72"}, 0x4b) r4 = syz_genetlink_get_family_id$ipvs(&(0x7f0000000100)='IPVS\x00') sendmsg$IPVS_CMD_SET_INFO(r3, &(0x7f0000000200)={&(0x7f0000000080)={0x10, 0x0, 0x0, 0x20000000}, 0xc, &(0x7f00000001c0)={&(0x7f0000000140)={0x4c, r4, 0x404, 0x70bd26, 0x25dfdbff, {}, [@IPVS_CMD_ATTR_TIMEOUT_TCP={0x8, 0x4, 0x9}, @IPVS_CMD_ATTR_SERVICE={0x30, 0x1, [@IPVS_SVC_ATTR_SCHED_NAME={0x8, 0x6, 'wlc\x00'}, @IPVS_SVC_ATTR_FLAGS={0xc, 0x7, {0x1, 0x30}}, @IPVS_SVC_ATTR_PE_NAME={0x8, 0xb, 'sip\x00'}, @IPVS_SVC_ATTR_AF={0x8, 0x1, 0xa}, @IPVS_SVC_ATTR_FWMARK={0x8, 0x5, 0x1}]}]}, 0x4c}, 0x1, 0x0, 0x0, 0x10}, 0x4000001) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) r5 = fcntl$getown(r1, 0x9) ioctl$BLKTRACESETUP(r3, 0xc0481273, &(0x7f0000000240)={[], 0x2, 0x1, 0x100000001, 0xce5, 0xffffffff7fffffff, r5}) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 581.590574] ? iov_iter_fault_in_readable+0x1b1/0x450 [ 581.590590] ? iov_iter_fault_in_readable+0x1b1/0x450 [ 581.590606] ? copy_page_from_iter+0x750/0x750 [ 581.614636] ? __sanitizer_cov_trace_cmp4+0x16/0x20 [ 581.619663] ? ktime_get_coarse_real_ts64+0x1ba/0x2b0 [ 581.624859] generic_perform_write+0x195/0x530 [ 581.629428] ? page_endio+0x780/0x780 [ 581.633211] ? current_time+0x140/0x140 [ 581.637171] ? lock_acquire+0x16f/0x3f0 [ 581.641162] __generic_file_write_iter+0x25e/0x630 [ 581.646080] ? __sanitizer_cov_trace_cmp8+0x18/0x20 [ 581.649286] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 581.651088] generic_file_write_iter+0x360/0x610 [ 581.651106] ? __generic_file_write_iter+0x630/0x630 [ 581.651121] ? __fget+0x340/0x540 [ 581.657447] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 581.662089] ? __sanitizer_cov_trace_const_cmp8+0x18/0x20 [ 581.662102] ? iov_iter_init+0xea/0x220 [ 581.662119] __vfs_write+0x613/0x8e0 [ 581.692811] ? kernel_read+0x120/0x120 [ 581.696717] ? rcu_read_lock_sched_held+0x110/0x130 [ 581.701742] ? rcu_sync_lockdep_assert+0x73/0xb0 [ 581.706493] ? __sanitizer_cov_trace_const_cmp4+0x16/0x20 [ 581.712025] ? __sb_start_write+0x1ac/0x360 [ 581.716345] vfs_write+0x20c/0x580 [ 581.719883] ksys_write+0xea/0x1f0 [ 581.723420] ? __ia32_sys_read+0xb0/0xb0 [ 581.727490] ? do_syscall_64+0x26/0x610 [ 581.731464] ? entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.736823] ? do_syscall_64+0x26/0x610 [ 581.740829] __x64_sys_write+0x73/0xb0 [ 581.744724] do_syscall_64+0x103/0x610 [ 581.748624] entry_SYSCALL_64_after_hwframe+0x49/0xbe [ 581.753805] RIP: 0033:0x457f29 [ 581.756994] Code: ad b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 00 66 90 48 89 f8 48 89 f7 48 89 d6 48 89 ca 4d 89 c2 4d 89 c8 4c 8b 4c 24 08 0f 05 <48> 3d 01 f0 ff ff 0f 83 7b b8 fb ff c3 66 2e 0f 1f 84 00 00 00 00 [ 581.775896] RSP: 002b:00007fec598aec78 EFLAGS: 00000246 ORIG_RAX: 0000000000000001 [ 581.783613] RAX: ffffffffffffffda RBX: 0000000000000003 RCX: 0000000000457f29 [ 581.790884] RDX: 0000000000000002 RSI: 0000000020000040 RDI: 0000000000000007 [ 581.798201] RBP: 000000000073bf00 R08: 0000000000000000 R09: 0000000000000000 [ 581.805472] R10: 0000000000000000 R11: 0000000000000246 R12: 00007fec598af6d4 [ 581.812748] R13: 00000000004c3cdf R14: 00000000004dc5e8 R15: 00000000ffffffff [ 581.835179] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 581.843356] kobject: 'kvm' (000000008ec18857): kobject_uevent_env 23:41:32 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x48, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 581.844459] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 581.859231] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 581.874318] kobject: 'loop1' (000000009adebb70): kobject_uevent_env [ 581.880772] kobject: 'loop1' (000000009adebb70): fill_kobj_path: path = '/devices/virtual/block/loop1' 23:41:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 581.913692] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 581.922851] kobject: 'loop4' (00000000ba33ce2a): kobject_uevent_env [ 581.944194] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getuid() r2 = getpgrp(0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) io_submit(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{}, 0x0, 0x0, 0x0, 0x0, r2}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) [ 581.956142] kobject: 'loop4' (00000000ba33ce2a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 581.993325] QAT: Invalid ioctl [ 582.006064] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 582.008356] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 582.013039] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.029098] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:41:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) r0 = openat$cgroup_ro(0xffffffffffffffff, &(0x7f0000000280)='cgroup.events\x00', 0x0, 0x0) ioctl$KDSKBMODE(r0, 0x4b45, &(0x7f00000002c0)=0x23) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r1 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) ioctl$int_out(r0, 0x2, &(0x7f0000000200)) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r1, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r1, 0x84, 0x6c, &(0x7f0000000300)={r2, 0xc6, "174c9d9ceea8f63c76d87520cf5e7372ff01fe7fff152e9b914a83c282d5915114c91a52461d01e3a7e27668446e9c067f0e410be84e5c6043b32d40f5f6725fd0e41759c98707d21a15076f4373d4a12ac5b2f46ad9345903b593999a34ec83dde27b575695dd3942fd33ae27d68ed6662b827ee7d0230c0990ca09af6580d31255b53dc38f52bba1daa5103185c619de843433c9007ab5abde933c33fa7f5261ef96e124fca33f6615fbe101ebc54ec4d4f0704b51c0a860461ee37069e6500ec5fcb7b173"}, 0x0) r3 = openat$cgroup_procs(r1, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r3, &(0x7f0000000180), 0x12) [ 582.033064] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.041171] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.049605] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 582.076659] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 582.083224] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 582.096163] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.118418] kobject: 'loop3' (000000004e775fd6): kobject_uevent_env [ 582.126914] kobject: 'loop3' (000000004e775fd6): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:41:32 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 582.145496] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 582.145800] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 582.163001] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 582.178239] kobject: 'kvm' (000000008ec18857): kobject_uevent_env 23:41:32 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x4c, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 582.196522] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 582.201689] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.213681] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.217040] kobject: 'kvm' (000000008ec18857): kobject_uevent_env 23:41:32 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) syz_mount_image$nfs4(&(0x7f0000000280)='nfs4\x00', &(0x7f00000002c0)='./file1\x00', 0x0, 0x3, &(0x7f0000000580)=[{&(0x7f0000000300)="94371d4639a5b987e8e04b8ca007a1137a8a03b764287107f0b3b5044c9f511f2ca7d296a3ed5b86b3ea75b0a8db3eee99bb8f326bd37e7d26dc7e99271c272b24ff0a55a8b3d8f8cabf73ea8d5fa063231727f050b819a230dfd6a226a18efe36a1ef60eaa46779e69595245970fda1d6598bdaccc0ef237b091edaf53126f96e751a6c7ec8dea6bad39f29af543dde058236aed45ee4b21e60f23b837ecaf8600f56762770dca4f5db53060161611e8e9a900751bb7fe27411ec4541e3b271375b8f807e93b4f582ec3e96a9b62b73", 0xd0, 0x5}, {&(0x7f0000000480)="1245c880790a083f59c5ec96809526be91ef9540d4f3540adee58a13a748423c62c408319668e3b3b7f8f29dd5939cd64360e84bb745c7c8f6cbd5793b968cb6847bc73d115891d5d665fef1277090842e43486cd2494880e0e634c0f86ec524cadfa851eaabe9a72807d2582a450b0d654afda136514141bd82e255feddce3829d771cbb2607cf49f752c6eaabc9426174f0a89515de3d6456fc8f227578aa2e514942d07ca58880b3486bda171893bad80c12c684ebe5e16ee2eb9b9866c05523785ebe50cb4eb36994ab7da7cde72668700cf", 0xd4, 0x9b}, {&(0x7f0000000400)="8e803a64abc8f5690d71a5d4f22fc556b946255917ce15a1d8db7ee75dba3872fcd6ea49d3bc2f3bc958dd0202d9121f70abcfa43651d2114413b7", 0x3b, 0x2ffd}], 0x2200000, &(0x7f0000000600)='cgroup.procs\x00') [ 582.238889] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 582.289482] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:32 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) r2 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000001c0)=ANY=[@ANYBLOB="0000eae173d07eab59ed4fc62483f85b6367abc7d993f70dc0c34bc8ee26fd643dcc7d01a6ba1301f9abafcfe29217fa6e0b0cc8c70e4c656cd31c7368932ab4c26aeb907a1e7820ccf2b802758d10c906c917a2b94d64f384b631ee7ccb36efb01843a7f4bfa01500000000b3c3f53c273b0b4368075df952d81b706ba21addf18992e0ed00276eb83ee2666f36a29af8392ec89fb571498180ad712af79ab3fb20048fc68f4a0e5b17b9bf1db34d93b408d29da82097547a07eb7ee8c951e8d84afaf0385a5873dbfb3b1e2172632826854c0746ecdc8e511d9663224eba3306516f723de0f0e0000000000000000000000000"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r2, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r2, 0xae80, 0x0) [ 582.349366] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.370275] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 582.370285] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:32 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, 0x0, 0x0) clone(0x2100001ffc, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) 23:41:32 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getuid() r2 = getpgrp(0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) io_submit(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{}, 0x0, 0x0, 0x0, 0x0, r2}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) 23:41:32 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x4d, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 582.417451] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.423983] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.450174] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 582.517924] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 582.524989] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 582.544446] kobject: 'loop0' (00000000ed722d31): kobject_uevent_env [ 582.550946] kobject: 'loop0' (00000000ed722d31): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 582.562732] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 582.563609] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.569643] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 582.586616] kobject: 'loop1' (000000009adebb70): kobject_uevent_env [ 582.592309] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.593151] kobject: 'loop1' (000000009adebb70): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 582.646763] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.653160] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.656608] kobject: 'loop3' (000000004e775fd6): kobject_uevent_env 23:41:32 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) 23:41:32 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 582.689444] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.694096] kobject: 'loop3' (000000004e775fd6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 582.709955] kobject: 'loop4' (00000000ba33ce2a): kobject_uevent_env [ 582.716768] kobject: 'loop4' (00000000ba33ce2a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 582.719941] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.731217] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 582.743588] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:41:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f00000002c0)=ANY=[@ANYRES32=r1, @ANYBLOB="3c000000174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e93914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be8b65c6043b32d4017ae374b538c6c74c1d2e6a04f61b226c9b4bb1a9a4e2c07d708452327832f3b023ebcb60db6232742f700e423e7a62853e094c6d79c60584bddb8e458a6b109b2faa717ef120722520bb43e815e3b1a12d6f4a0288ea39755200922fd6bba018f6f2978e3"], 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:33 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x50, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 582.824812] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.851921] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.861560] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env 23:41:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getuid() r2 = getpgrp(0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) io_submit(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{}, 0x0, 0x0, 0x0, 0x0, r2}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) [ 582.894791] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 582.916534] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 582.929668] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' 23:41:33 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="6368616e6765686174203078303030303030303030303030303030305ed259ca18d63d1ac02943371b50a0968c82b235f9e2a02a1c4429322dbe5cb6294a147122c6fa7da89bf30816c559c513660b92ca641bb93a880702a53fd9112beeb550b119aa5cbf67e83e1b6601947cbb3367e460f2ad2f2b288185b8cf001ee0580fb419944eda433263fcb826e63cbd69ba4c191cbde15e0d597aea8ccf89e87d0b90643c12fdb671b1443f3667783a3fb409c998de49168099d02890d422cae290c1d2a45172eab1d3a7082adfd76f3e2c13b0ac3073363e433ef75cb202539f887c2eebeca3873882615ff4bbdc53faed6c9ed11c6bb5669626373c1c81e8e6b8aeab12a7e76fed0f3c914044f9f14cc788a36c9e81232a86ae51c3a0"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 582.949930] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 582.969627] kobject: 'loop3' (000000004e775fd6): kobject_uevent_env [ 582.987417] kobject: 'loop3' (000000004e775fd6): fill_kobj_path: path = '/devices/virtual/block/loop3' 23:41:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) creat(&(0x7f0000000280)='./file0\x00', 0x81) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000300)=ANY=[@ANYRES32=0x0, @ANYBLOB="20fa400600d9046c5f64d1faa96f7944ad170e848f544b000000000000000000"], &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) setsockopt$inet_sctp_SCTP_FRAGMENT_INTERLEAVE(r0, 0x84, 0x12, &(0x7f00000002c0)=0xfff, 0x4) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) [ 582.997454] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 582.997976] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.016938] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 583.018286] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.027284] kobject: 'loop4' (00000000ba33ce2a): kobject_uevent_env [ 583.044192] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\xff', &(0x7f00000002c0)='./file0\x00', 0x0, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 583.076368] kobject: 'loop4' (00000000ba33ce2a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 583.112961] kobject: 'loop1' (000000009adebb70): kobject_uevent_env [ 583.143432] kobject: 'loop1' (000000009adebb70): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 583.152314] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.160994] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.173083] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 583.180117] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.206561] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.214508] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 583.220315] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 583.234629] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 583.236347] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:33 executing program 0: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) socketpair$tipc(0x1e, 0x0, 0x0, &(0x7f0000000040)={0xffffffffffffffff}) getsockopt$IP_VS_SO_GET_DAEMON(r2, 0x0, 0x487, &(0x7f0000000080), &(0x7f0000000100)=0x30) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$KVM_SET_USER_MEMORY_REGION(r1, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r3, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$KVM_RUN(r3, 0xae80, 0x0) 23:41:33 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x54, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) 23:41:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000280)={r1, 0x22d, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d403887e77e555eed04288d558f0f0b17b3300e265c1276df2936b1387cdb22136a3506bb535b5e804ec8bef6f3dc164e09c7ccd21f206a44bf2536f818de9acc60b008c63600191dd0c69d328b"}, 0x0) getsockopt$inet_IP_XFRM_POLICY(r0, 0x0, 0x11, &(0x7f0000000340)={{{@in6=@ipv4={[], [], @empty}, @in6=@mcast2, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in=@loopback}, 0x0, @in6=@empty}}, &(0x7f0000000200)=0xe8) r3 = getegid() getsockopt$inet_IP_IPSEC_POLICY(r0, 0x0, 0x10, &(0x7f0000000480)={{{@in6=@initdev, @in6=@loopback, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}}, {{@in6=@ipv4={[], [], @multicast2}}, 0x0, @in=@empty}}, &(0x7f0000000240)=0xe8) r5 = getgid() r6 = getuid() r7 = getegid() stat(&(0x7f00000006c0)='./file1\x00', &(0x7f0000000700)={0x0, 0x0, 0x0, 0x0, 0x0, 0x0}) write$FUSE_DIRENTPLUS(r0, &(0x7f0000000780)={0x2b0, 0x0, 0x4, [{{0x5, 0x0, 0x400, 0xfffffffffffffffc, 0x27c, 0x5, {0x1, 0xb3a, 0x9, 0x6, 0x5, 0x1, 0x2, 0x9, 0x2, 0x0, 0x8, r2, r3, 0x9, 0x3}}, {0x0, 0x80000001, 0xd, 0x0, 'cgroup.procs\x00'}}, {{0x6, 0x1, 0x7f, 0x10000, 0x5, 0x20, {0x4, 0x2, 0x3, 0xb8a, 0xa8, 0x65e, 0x9, 0x4, 0xff, 0xfb4, 0x9e79, r4, r5, 0x5, 0x7}}, {0x0, 0x458d, 0x12, 0xffff, './cgroup.net/.yz0\x00'}}, {{0x6, 0x3, 0x4, 0x1, 0x7fffffff, 0x7f, {0x3, 0x8001, 0x6, 0x1f, 0x3, 0x3, 0xffffffff, 0x6, 0xffffffffffffff47, 0x0, 0x39a9, r6, r7, 0x80000001, 0xffffffffffffff2e}}, {0x4, 0x56c, 0x6, 0x1, 'vmnet0'}}, {{0x6, 0x2, 0x3f, 0x8, 0x5, 0xfffffffffffff800, {0x5, 0xce1, 0x6, 0x7, 0x3ff, 0x800, 0x253, 0x2, 0x4, 0x3, 0x1, 0x0, r8, 0x3, 0xfff}}, {0x1, 0xff, 0xd, 0x81ab, 'cgroup.procs\x00'}}]}, 0x2b0) r9 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r9, &(0x7f0000000180), 0x12) [ 583.241411] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 583.260643] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.267698] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:41:33 executing program 1: clone(0x200, 0x0, 0x0, 0x0, 0x0) mknod(&(0x7f00000000c0)='./file0\x00', 0x103c, 0x0) execve(&(0x7f0000000280)='./file0\x00', 0x0, 0x0) r0 = gettid() timer_create(0x0, &(0x7f0000000040)={0x0, 0x12}, &(0x7f00009b1ffc)) timer_settime(0x0, 0x0, &(0x7f0000000000)={{0x0, 0x989680}, {0x0, 0x9}}, 0x0) clone(0x0, 0x0, 0xfffffffffffffffe, 0x0, 0xffffffffffffffff) r1 = openat$apparmor_thread_current(0xffffffffffffff9c, &(0x7f0000000100)='/proc/thread-self/attr/current\x00', 0x2, 0x0) write$apparmor_current(r1, &(0x7f00000002c0)=ANY=[@ANYBLOB="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"], 0x1) socketpair$unix(0x1, 0x5, 0x0, &(0x7f0000000180)={0xffffffffffffffff, 0xffffffffffffffff}) ioctl$PERF_EVENT_IOC_ENABLE(r2, 0x8912, 0x400200) ptrace$setopts(0x4206, r0, 0x0, 0x0) r3 = gettid() tkill(r3, 0x1000000000016) [ 583.309916] kobject: 'loop4' (00000000ba33ce2a): kobject_uevent_env [ 583.328885] kobject: 'loop4' (00000000ba33ce2a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 583.346341] kobject: 'kvm' (000000008ec18857): kobject_uevent_env 23:41:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getuid() r2 = getpgrp(0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) io_submit(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{}, 0x0, 0x0, 0x0, 0x0, r2}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) setsockopt$inet_sctp6_SCTP_PR_SUPPORTED(0xffffffffffffffff, 0x84, 0x65, 0x0, 0x0) [ 583.354832] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.359113] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 583.376277] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 583.379587] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 583.398204] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:33 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) set_mempolicy(0xc000, &(0x7f0000000280), 0x8) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:33 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x2, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 583.448433] kobject: 'loop0' (00000000ed722d31): kobject_uevent_env [ 583.486089] kobject: 'kvm' (000000008ec18857): kobject_uevent_env 23:41:33 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x5c, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 583.492417] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 583.508930] kobject: 'loop0' (00000000ed722d31): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 583.516734] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.526989] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.534535] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 583.542012] kobject: 'loop1' (000000009adebb70): kobject_uevent_env [ 583.547745] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 583.554020] kobject: 'loop1' (000000009adebb70): fill_kobj_path: path = '/devices/virtual/block/loop1' [ 583.584328] kobject: 'loop3' (000000004e775fd6): kobject_uevent_env [ 583.599524] kobject: 'loop3' (000000004e775fd6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 583.602852] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.621190] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.628945] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 583.636794] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:41:33 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getuid() r2 = getpgrp(0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) io_submit(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{}, 0x0, 0x0, 0x0, 0x0, r2}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) getsockopt$inet_sctp_SCTP_PEER_ADDR_THLDS(0xffffffffffffffff, 0x84, 0x1f, 0x0, 0x0) [ 583.664952] kobject: 'loop4' (00000000ba33ce2a): kobject_uevent_env [ 583.679625] kobject: 'loop4' (00000000ba33ce2a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 583.706255] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 583.734593] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.741152] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 583.741282] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:41:33 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x60, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 583.811019] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.846316] kobject: 'kvm' (000000008ec18857): kobject_uevent_env 23:41:34 executing program 2: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) syz_mount_image$btrfs(&(0x7f0000000080)='btrfs\x00', &(0x7f00000002c0)='./file0\x00', 0x3, 0x0, 0x0, 0x0, &(0x7f0000002840)={[{@max_inline={'max_inline'}}, {@subvolid={'subvolid'}}], [{@fsname={'fsname', 0x3d, 'cgroupsecurity(&#[systemnodev'}}]}) [ 583.860033] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 583.924222] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 583.967408] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 583.973702] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' 23:41:34 executing program 0: r0 = openat$audio(0xffffffffffffff9c, &(0x7f0000000040)='/dev/audio\x00', 0x2, 0x0) r1 = openat$proc_capi20(0xffffffffffffff9c, &(0x7f0000000080)='/proc/capi/capi20\x00', 0x2000, 0x0) r2 = dup3(0xffffffffffffff9c, 0xffffffffffffff9c, 0x80000) ioctl$KVM_SET_CLOCK(r0, 0x4030ae7b, &(0x7f0000000140)={0x0, 0x1}) getsockopt$inet_mreqn(r0, 0x0, 0x20, &(0x7f0000000600)={@remote, @multicast1, 0x0}, &(0x7f0000000640)=0xc) sendmsg$nl_route_sched(r0, &(0x7f0000000700)={&(0x7f0000000300)={0x10, 0x0, 0x0, 0x4000088}, 0xc, &(0x7f00000006c0)={&(0x7f0000000680)=@gettfilter={0x24, 0x2e, 0x24, 0x70bd27, 0x25dfdbfc, {0x0, r3, {0xffff, 0xfffb}, {0xf, 0xc}, {0x9, 0x3}}}, 0x24}, 0x1, 0x0, 0x0, 0x10}, 0x40044) ioctl$KVM_IRQFD(r0, 0x4020ae76, &(0x7f0000000100)={r1, 0x5, 0xfffffffffffff02a, r2}) r4 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000000)='/dev/kvm\x00', 0x0, 0x0) r5 = ioctl$KVM_CREATE_VM(r4, 0xae01, 0x0) r6 = ioctl$KVM_CREATE_VCPU(r5, 0xae41, 0x800000) ioctl$KVM_SET_USER_MEMORY_REGION(r5, 0x4020ae46, &(0x7f00000002c0)={0x0, 0x0, 0x0, 0x2000, &(0x7f0000000000/0x2000)=nil}) ioctl$KVM_GET_REG_LIST(0xffffffffffffffff, 0xc008aeb0, &(0x7f00000000c0)=ANY=[@ANYBLOB="0000ea6fe7191855"]) syz_kvm_setup_cpu$x86(0xffffffffffffffff, r6, &(0x7f0000028000/0x18000)=nil, 0xffffffffffffffff, 0x0, 0x0, 0x0, 0x0) ioctl$sock_kcm_SIOCKCMUNATTACH(r2, 0x89e1, &(0x7f0000000340)={r2}) ioctl$KVM_RUN(r6, 0xae80, 0x0) shutdown(r0, 0x1) r7 = syz_genetlink_get_family_id$ipvs(&(0x7f00000001c0)='IPVS\x00') sendmsg$IPVS_CMD_SET_DEST(r1, &(0x7f0000000280)={&(0x7f0000000180)={0x10, 0x0, 0x0, 0x402020}, 0xc, &(0x7f0000000240)={&(0x7f0000000200)={0x40, r7, 0x321, 0x70bd2c, 0x25dfdbfc, {}, [@IPVS_CMD_ATTR_DEST={0x2c, 0x2, [@IPVS_DEST_ATTR_WEIGHT={0x8, 0x4, 0x7f}, @IPVS_DEST_ATTR_U_THRESH={0x8, 0x5, 0x100000001}, @IPVS_DEST_ATTR_INACT_CONNS={0x8}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x3}, @IPVS_DEST_ATTR_ACTIVE_CONNS={0x8, 0x7, 0x7ff}]}]}, 0x40}, 0x1, 0x0, 0x0, 0x804}, 0x20000804) ftruncate(r4, 0x23) ioctl$KVM_RUN(r6, 0xae80, 0x0) 23:41:34 executing program 5: perf_event_open(&(0x7f0000000180)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x1ff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0xffffffffffffffff, 0xffffffffffffffff, 0x0) bpf$MAP_LOOKUP_ELEM(0x1, 0x0, 0x0) mkdirat(0xffffffffffffff9c, &(0x7f00000000c0)='./file0\x00', 0x0) ioctl$KVM_ENABLE_CAP(0xffffffffffffffff, 0x4068aea3, 0x0) mkdirat$cgroup_root(0xffffffffffffff9c, &(0x7f0000000000)='./cgroup.net/.yz0\x00', 0x1ff) mount$fuse(0x20000000, &(0x7f0000000440)='./file0\x00', 0x0, 0x7a00, 0x0) r0 = open(&(0x7f0000000100)='./file0\x00', 0x0, 0x0) getsockopt$inet_sctp6_SCTP_RESET_STREAMS(r0, 0x84, 0x77, &(0x7f0000000040)={0x0, 0x4, 0x1, [0x9]}, &(0x7f0000000080)=0xa) mincore(&(0x7f0000ff9000/0x4000)=nil, 0x4000, &(0x7f0000000280)=""/205) getsockopt$inet_sctp_SCTP_GET_PEER_ADDRS(r0, 0x84, 0x6c, &(0x7f0000000200)={r1, 0x3c, "174c9d9ceea8f63c76d87520cf5e73724fbbfe7fff152e9b914a83c282d5915114c91a52461d01e3a7e2766844659c067f0e410be84e5c6043b32d40"}, 0x0) r2 = openat$cgroup_procs(r0, &(0x7f0000000140)='cgroup.procs\x00', 0x2, 0x0) write$cgroup_pid(r2, &(0x7f0000000180), 0x12) 23:41:34 executing program 4: r0 = memfd_create(&(0x7f0000000100)='\vem1\xc1\xf8\xa6\x8dN\xc0\xa3\\\xe2\xcb\xa2\xba\xe5\xf4\x97\xac#*\xff', 0x0) write(r0, &(0x7f0000000040)="0600", 0x2) write$FUSE_NOTIFY_STORE(r0, &(0x7f00000002c0)=ANY=[@ANYBLOB="3c00070003000100000000002500000000000000000000000000000020000000000000000000000000000000"], 0x2c) sendfile(r0, r0, &(0x7f0000000140), 0xffff) perf_event_open(&(0x7f000001d000)={0x1, 0x70, 0x0, 0x0, 0x0, 0x0, 0x0, 0x41c1, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, @perf_config_ext}, 0x0, 0x0, 0xffffffffffffffff, 0x0) mmap(&(0x7f0000000000/0x7000)=nil, 0x7000, 0x80000000004, 0x11, r0, 0x0) socketpair$unix(0x1, 0x5, 0x0, &(0x7f000001a000)={0xffffffffffffffff, 0xffffffffffffffff}) setsockopt$SO_ATTACH_FILTER(r1, 0x61, 0x1a, &(0x7f000002eff0)={0x1e4, &(0x7f0000000000)=[{}]}, 0x10) [ 584.017337] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 584.041961] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' 23:41:34 executing program 3: r0 = openat$kvm(0xffffffffffffff9c, &(0x7f0000000100)='/dev/kvm\x00', 0x0, 0x0) r1 = ioctl$KVM_CREATE_VM(r0, 0xae01, 0x0) ioctl$KVM_CREATE_IRQCHIP(r1, 0xae60) getuid() r2 = getpgrp(0x0) io_setup(0x0, 0x0) dup(0xffffffffffffffff) syz_open_procfs(0x0, 0x0) io_submit(0x0, 0x0, 0x0) shmctl$IPC_SET(0x0, 0x1, &(0x7f00000001c0)={{}, 0x0, 0x0, 0x0, 0x0, r2}) r3 = ioctl$KVM_CREATE_VCPU(r1, 0xae41, 0x0) ioctl$SNDRV_CTL_IOCTL_ELEM_UNLOCK(0xffffffffffffffff, 0x40405515, &(0x7f00000000c0)={0x0, 0x0, 0x0, 0x0, 'y\x14\bK\x16^\x9e\xc5/\x15\x95\xab)\xeb\xf0\x15\xf3{T\x1aWP\xac\xb2\xac\x95\xe9\xad9b\xaf5.S#\xb7y\x82\x1f\xa5^\xe1K\xf9'}) write$P9_RLERROR(0xffffffffffffffff, 0x0, 0x0) ioctl$KVM_GET_VCPU_EVENTS(r3, 0x4400ae8f, &(0x7f0000000000)) ioctl$KVM_RUN(r3, 0xae80, 0x0) [ 584.089986] kobject: 'loop0' (00000000ed722d31): kobject_uevent_env [ 584.102827] kobject: 'loop0' (00000000ed722d31): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 584.123618] kobject: 'loop5' (000000002ac03f3d): kobject_uevent_env [ 584.141531] kobject: 'loop2' (0000000054ff97b2): kobject_uevent_env [ 584.150065] kobject: 'loop5' (000000002ac03f3d): fill_kobj_path: path = '/devices/virtual/block/loop5' [ 584.168855] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 584.172608] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 584.176919] kobject: 'loop2' (0000000054ff97b2): fill_kobj_path: path = '/devices/virtual/block/loop2' [ 584.193551] kobject: 'loop4' (00000000ba33ce2a): kobject_uevent_env [ 584.200520] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 584.218285] kobject: 'loop4' (00000000ba33ce2a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 584.231037] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 584.266966] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 584.274359] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 584.280370] kobject: 'loop3' (000000004e775fd6): kobject_uevent_env [ 584.280631] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 584.299924] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 584.305856] kobject: 'loop3' (000000004e775fd6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 584.353259] kobject: 'loop3' (000000004e775fd6): kobject_uevent_env [ 584.362417] kobject: 'loop3' (000000004e775fd6): fill_kobj_path: path = '/devices/virtual/block/loop3' [ 584.390342] kobject: 'loop4' (00000000ba33ce2a): kobject_uevent_env [ 584.417992] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 584.426384] kobject: 'loop4' (00000000ba33ce2a): fill_kobj_path: path = '/devices/virtual/block/loop4' [ 584.436674] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 584.486260] kobject: 'kvm' (000000008ec18857): kobject_uevent_env [ 584.506906] kobject: 'kvm' (000000008ec18857): fill_kobj_path: path = '/devices/virtual/misc/kvm' [ 584.549184] kobject: 'loop0' (00000000ed722d31): kobject_uevent_env [ 584.557153] kobject: 'loop0' (00000000ed722d31): fill_kobj_path: path = '/devices/virtual/block/loop0' [ 584.557301] kobject: 'batman_adv' (00000000220dbee0): kobject_uevent_env [ 584.573898] kobject: 'batman_adv' (00000000220dbee0): kobject_uevent_env: filter function caused the event to drop! [ 584.585209] kobject: 'batman_adv' (00000000220dbee0): kobject_cleanup, parent (null) [ 584.594067] kobject: 'batman_adv' (00000000220dbee0): calling ktype release [ 584.601186] kobject: (00000000220dbee0): dynamic_kobj_release [ 584.607467] kobject: 'batman_adv': free name [ 584.612034] kobject: 'rx-0' (000000008468e45f): kobject_cleanup, parent 000000008e2791cc [ 584.620659] kobject: 'rx-0' (000000008468e45f): auto cleanup 'remove' event [ 584.627916] kobject: 'rx-0' (000000008468e45f): kobject_uevent_env [ 584.634481] kobject: 'rx-0' (000000008468e45f): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 584.645026] kobject: 'rx-0' (000000008468e45f): auto cleanup kobject_del [ 584.651903] kobject: 'rx-0' (000000008468e45f): calling ktype release [ 584.658642] kobject: 'rx-0': free name [ 584.662614] kobject: 'tx-0' (000000009effd955): kobject_cleanup, parent 000000008e2791cc [ 584.671054] kobject: 'tx-0' (000000009effd955): auto cleanup 'remove' event [ 584.678280] kobject: 'tx-0' (000000009effd955): kobject_uevent_env [ 584.684906] kobject: 'tx-0' (000000009effd955): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 584.695467] kobject: 'tx-0' (000000009effd955): auto cleanup kobject_del [ 584.702351] kobject: 'tx-0' (000000009effd955): calling ktype release [ 584.709230] kobject: 'tx-0': free name [ 584.713291] kobject: 'queues' (000000008e2791cc): kobject_cleanup, parent (null) [ 584.721862] kobject: 'queues' (000000008e2791cc): calling ktype release [ 584.728886] kobject: 'queues' (000000008e2791cc): kset_release [ 584.734943] kobject: 'queues': free name [ 584.739206] kobject: 'syz_tun' (0000000074e23f3d): kobject_uevent_env [ 584.746274] kobject: 'syz_tun' (0000000074e23f3d): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 584.756224] kobject: 'syz_tun' (0000000074e23f3d): kobject_cleanup, parent (null) [ 584.764820] kobject: 'syz_tun' (0000000074e23f3d): calling ktype release [ 584.771744] kobject: 'syz_tun': free name [ 584.980041] kobject: 'rx-0' (000000009efcbdc7): kobject_cleanup, parent 00000000fd66e0ae [ 584.993912] kobject: 'rx-0' (000000009efcbdc7): auto cleanup 'remove' event [ 585.011227] kobject: 'rx-0' (000000009efcbdc7): kobject_uevent_env [ 585.018119] kobject: 'rx-0' (000000009efcbdc7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.028625] kobject: 'rx-0' (000000009efcbdc7): auto cleanup kobject_del [ 585.035944] kobject: 'rx-0' (000000009efcbdc7): calling ktype release [ 585.042617] kobject: 'rx-0': free name [ 585.046922] kobject: 'tx-0' (000000009b18e069): kobject_cleanup, parent 00000000fd66e0ae [ 585.063851] kobject: 'tx-0' (000000009b18e069): auto cleanup 'remove' event [ 585.081189] kobject: 'tx-0' (000000009b18e069): kobject_uevent_env [ 585.091294] kobject: 'tx-0' (000000009b18e069): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.111673] kobject: 'tx-0' (000000009b18e069): auto cleanup kobject_del [ 585.131962] kobject: 'tx-0' (000000009b18e069): calling ktype release [ 585.138950] kobject: 'tx-0': free name [ 585.153080] kobject: 'queues' (00000000fd66e0ae): kobject_cleanup, parent (null) [ 585.161950] kobject: 'queues' (00000000fd66e0ae): calling ktype release [ 585.169051] kobject: 'queues' (00000000fd66e0ae): kset_release [ 585.175310] kobject: 'queues': free name [ 585.179770] kobject: 'ip6gre0' (00000000e8d1021b): kobject_uevent_env [ 585.187109] kobject: 'ip6gre0' (00000000e8d1021b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.198787] kobject: 'batman_adv' (0000000095ce6626): kobject_uevent_env [ 585.205966] kobject: 'batman_adv' (0000000095ce6626): kobject_uevent_env: filter function caused the event to drop! [ 585.219297] kobject: 'batman_adv' (0000000095ce6626): kobject_cleanup, parent (null) [ 585.228438] kobject: 'batman_adv' (0000000095ce6626): calling ktype release [ 585.238548] kobject: (0000000095ce6626): dynamic_kobj_release [ 585.244785] kobject: 'batman_adv': free name [ 585.256527] kobject: 'rx-0' (00000000b2672e99): kobject_cleanup, parent 000000007ce9d5f9 [ 585.276208] kobject: 'rx-0' (00000000b2672e99): auto cleanup 'remove' event [ 585.283354] kobject: 'rx-0' (00000000b2672e99): kobject_uevent_env [ 585.310132] kobject: 'rx-0' (00000000b2672e99): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.326623] kobject: 'rx-0' (00000000b2672e99): auto cleanup kobject_del [ 585.349079] kobject: 'rx-0' (00000000b2672e99): calling ktype release [ 585.357096] kobject: 'rx-0': free name [ 585.361266] kobject: 'tx-0' (00000000367484d6): kobject_cleanup, parent 000000007ce9d5f9 [ 585.371042] kobject: 'tx-0' (00000000367484d6): auto cleanup 'remove' event [ 585.379727] kobject: 'tx-0' (00000000367484d6): kobject_uevent_env [ 585.386139] kobject: 'tx-0' (00000000367484d6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.396639] kobject: 'tx-0' (00000000367484d6): auto cleanup kobject_del [ 585.403692] kobject: 'tx-0' (00000000367484d6): calling ktype release [ 585.410396] kobject: 'tx-0': free name [ 585.414375] kobject: 'queues' (000000007ce9d5f9): kobject_cleanup, parent (null) [ 585.422780] kobject: 'queues' (000000007ce9d5f9): calling ktype release [ 585.429631] kobject: 'queues' (000000007ce9d5f9): kset_release [ 585.435783] kobject: 'queues': free name [ 585.440046] kobject: 'ip6gretap0' (00000000a3d8c789): kobject_uevent_env [ 585.447020] kobject: 'ip6gretap0' (00000000a3d8c789): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.513945] kobject: 'ip6gre0' (00000000e8d1021b): kobject_cleanup, parent (null) [ 585.522470] kobject: 'ip6gre0' (00000000e8d1021b): auto cleanup 'remove' event [ 585.531354] kobject: 'ip6gre0' (00000000e8d1021b): kobject_uevent_env [ 585.538088] kobject: 'ip6gre0' (00000000e8d1021b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.548483] kobject: 'ip6gre0' (00000000e8d1021b): calling ktype release [ 585.555433] kobject: 'ip6gre0': free name [ 585.559679] kobject: 'ip6gretap0' (00000000a3d8c789): kobject_cleanup, parent (null) [ 585.568545] kobject: 'ip6gretap0' (00000000a3d8c789): auto cleanup 'remove' event [ 585.576224] kobject: 'ip6gretap0' (00000000a3d8c789): kobject_uevent_env [ 585.583123] kobject: 'ip6gretap0' (00000000a3d8c789): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.593936] kobject: 'ip6gretap0' (00000000a3d8c789): calling ktype release [ 585.601097] kobject: 'ip6gretap0': free name [ 585.628439] kobject: 'rx-0' (00000000e6b77c55): kobject_cleanup, parent 000000005bbc6b63 [ 585.636824] kobject: 'rx-0' (00000000e6b77c55): auto cleanup 'remove' event [ 585.644265] kobject: 'rx-0' (00000000e6b77c55): kobject_uevent_env [ 585.650596] kobject: 'rx-0' (00000000e6b77c55): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.660732] kobject: 'rx-0' (00000000e6b77c55): auto cleanup kobject_del [ 585.667871] kobject: 'rx-0' (00000000e6b77c55): calling ktype release [ 585.674624] kobject: 'rx-0': free name [ 585.678548] kobject: 'tx-0' (00000000cf5f99e7): kobject_cleanup, parent 000000005bbc6b63 [ 585.686884] kobject: 'tx-0' (00000000cf5f99e7): auto cleanup 'remove' event [ 585.694035] kobject: 'tx-0' (00000000cf5f99e7): kobject_uevent_env [ 585.700544] kobject: 'tx-0' (00000000cf5f99e7): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.710644] kobject: 'tx-0' (00000000cf5f99e7): auto cleanup kobject_del [ 585.717597] kobject: 'tx-0' (00000000cf5f99e7): calling ktype release [ 585.724307] kobject: 'tx-0': free name [ 585.728397] kobject: 'queues' (000000005bbc6b63): kobject_cleanup, parent (null) [ 585.736847] kobject: 'queues' (000000005bbc6b63): calling ktype release [ 585.743607] kobject: 'queues' (000000005bbc6b63): kset_release [ 585.749678] kobject: 'queues': free name [ 585.754260] kobject: 'ip6tnl0' (00000000da24fe15): kobject_uevent_env [ 585.760899] kobject: 'ip6tnl0' (00000000da24fe15): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.830446] kobject: 'ip6tnl0' (00000000da24fe15): kobject_cleanup, parent (null) [ 585.839219] kobject: 'ip6tnl0' (00000000da24fe15): auto cleanup 'remove' event [ 585.846687] kobject: 'ip6tnl0' (00000000da24fe15): kobject_uevent_env [ 585.853300] kobject: 'ip6tnl0' (00000000da24fe15): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.864064] kobject: 'ip6tnl0' (00000000da24fe15): calling ktype release [ 585.871063] kobject: 'ip6tnl0': free name [ 585.898403] kobject: 'rx-0' (00000000e94918f1): kobject_cleanup, parent 0000000078f0f2f9 [ 585.906877] kobject: 'rx-0' (00000000e94918f1): auto cleanup 'remove' event [ 585.914046] kobject: 'rx-0' (00000000e94918f1): kobject_uevent_env [ 585.920569] kobject: 'rx-0' (00000000e94918f1): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.930805] kobject: 'rx-0' (00000000e94918f1): auto cleanup kobject_del [ 585.937758] kobject: 'rx-0' (00000000e94918f1): calling ktype release [ 585.944888] kobject: 'rx-0': free name [ 585.948819] kobject: 'tx-0' (0000000085991a58): kobject_cleanup, parent 0000000078f0f2f9 [ 585.957150] kobject: 'tx-0' (0000000085991a58): auto cleanup 'remove' event [ 585.964449] kobject: 'tx-0' (0000000085991a58): kobject_uevent_env [ 585.970875] kobject: 'tx-0' (0000000085991a58): kobject_uevent_env: uevent_suppress caused the event to drop! [ 585.981030] kobject: 'tx-0' (0000000085991a58): auto cleanup kobject_del [ 585.987938] kobject: 'tx-0' (0000000085991a58): calling ktype release [ 585.994559] kobject: 'tx-0': free name [ 585.998475] kobject: 'queues' (0000000078f0f2f9): kobject_cleanup, parent (null) [ 586.007018] kobject: 'queues' (0000000078f0f2f9): calling ktype release [ 586.013786] kobject: 'queues' (0000000078f0f2f9): kset_release [ 586.019806] kobject: 'queues': free name [ 586.024180] kobject: 'sit0' (000000003ff630a9): kobject_uevent_env [ 586.030631] kobject: 'sit0' (000000003ff630a9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.063969] kobject: 'sit0' (000000003ff630a9): kobject_cleanup, parent (null) [ 586.072598] kobject: 'sit0' (000000003ff630a9): auto cleanup 'remove' event [ 586.079799] kobject: 'sit0' (000000003ff630a9): kobject_uevent_env [ 586.086170] kobject: 'sit0' (000000003ff630a9): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.096291] kobject: 'sit0' (000000003ff630a9): calling ktype release [ 586.102960] kobject: 'sit0': free name [ 586.129364] kobject: 'rx-0' (00000000a3445f25): kobject_cleanup, parent 000000007220703f [ 586.138171] kobject: 'rx-0' (00000000a3445f25): auto cleanup 'remove' event [ 586.145370] kobject: 'rx-0' (00000000a3445f25): kobject_uevent_env [ 586.151698] kobject: 'rx-0' (00000000a3445f25): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.161816] kobject: 'rx-0' (00000000a3445f25): auto cleanup kobject_del [ 586.168704] kobject: 'rx-0' (00000000a3445f25): calling ktype release [ 586.175507] kobject: 'rx-0': free name [ 586.179581] kobject: 'tx-0' (000000005dc03d2f): kobject_cleanup, parent 000000007220703f [ 586.187860] kobject: 'tx-0' (000000005dc03d2f): auto cleanup 'remove' event [ 586.195045] kobject: 'tx-0' (000000005dc03d2f): kobject_uevent_env [ 586.201365] kobject: 'tx-0' (000000005dc03d2f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.211551] kobject: 'tx-0' (000000005dc03d2f): auto cleanup kobject_del [ 586.219031] kobject: 'tx-0' (000000005dc03d2f): calling ktype release [ 586.225651] kobject: 'tx-0': free name [ 586.229565] kobject: 'queues' (000000007220703f): kobject_cleanup, parent (null) [ 586.238013] kobject: 'queues' (000000007220703f): calling ktype release [ 586.244805] kobject: 'queues' (000000007220703f): kset_release [ 586.250900] kobject: 'queues': free name [ 586.255291] kobject: 'ip6_vti0' (00000000030331e4): kobject_uevent_env [ 586.261959] kobject: 'ip6_vti0' (00000000030331e4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.334211] kobject: 'ip6_vti0' (00000000030331e4): kobject_cleanup, parent (null) [ 586.342982] kobject: 'ip6_vti0' (00000000030331e4): auto cleanup 'remove' event [ 586.350611] kobject: 'ip6_vti0' (00000000030331e4): kobject_uevent_env [ 586.357545] kobject: 'ip6_vti0' (00000000030331e4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.368220] kobject: 'ip6_vti0' (00000000030331e4): calling ktype release [ 586.375391] kobject: 'ip6_vti0': free name [ 586.419340] kobject: 'rx-0' (00000000817c4cf6): kobject_cleanup, parent 00000000ed1a602d [ 586.427841] kobject: 'rx-0' (00000000817c4cf6): auto cleanup 'remove' event [ 586.435287] kobject: 'rx-0' (00000000817c4cf6): kobject_uevent_env [ 586.441615] kobject: 'rx-0' (00000000817c4cf6): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.451733] kobject: 'rx-0' (00000000817c4cf6): auto cleanup kobject_del [ 586.458650] kobject: 'rx-0' (00000000817c4cf6): calling ktype release [ 586.465493] kobject: 'rx-0': free name [ 586.469411] kobject: 'tx-0' (00000000387f695c): kobject_cleanup, parent 00000000ed1a602d [ 586.477774] kobject: 'tx-0' (00000000387f695c): auto cleanup 'remove' event [ 586.484945] kobject: 'tx-0' (00000000387f695c): kobject_uevent_env [ 586.491315] kobject: 'tx-0' (00000000387f695c): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.501401] kobject: 'tx-0' (00000000387f695c): auto cleanup kobject_del [ 586.508612] kobject: 'tx-0' (00000000387f695c): calling ktype release [ 586.515279] kobject: 'tx-0': free name [ 586.519205] kobject: 'queues' (00000000ed1a602d): kobject_cleanup, parent (null) [ 586.527780] kobject: 'queues' (00000000ed1a602d): calling ktype release [ 586.534554] kobject: 'queues' (00000000ed1a602d): kset_release [ 586.540642] kobject: 'queues': free name [ 586.545081] kobject: 'ip_vti0' (00000000b6d3bd36): kobject_uevent_env [ 586.551886] kobject: 'ip_vti0' (00000000b6d3bd36): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.565920] IPVS: ftp: loaded support on port[0] = 21 [ 586.573269] kobject: 'lo' (000000006ed81f7b): kobject_add_internal: parent: 'net', set: 'devices' [ 586.582853] kobject: 'lo' (000000006ed81f7b): kobject_uevent_env [ 586.589065] kobject: 'lo' (000000006ed81f7b): fill_kobj_path: path = '/devices/virtual/net/lo' [ 586.598099] kobject: 'queues' (0000000078f3fa7b): kobject_add_internal: parent: 'lo', set: '' [ 586.607506] kobject: 'queues' (0000000078f3fa7b): kobject_uevent_env [ 586.614041] kobject: 'queues' (0000000078f3fa7b): kobject_uevent_env: filter function caused the event to drop! [ 586.624418] kobject: 'rx-0' (00000000e5c7a6e6): kobject_add_internal: parent: 'queues', set: 'queues' [ 586.633956] kobject: 'rx-0' (00000000e5c7a6e6): kobject_uevent_env [ 586.640313] kobject: 'rx-0' (00000000e5c7a6e6): fill_kobj_path: path = '/devices/virtual/net/lo/queues/rx-0' [ 586.650478] kobject: 'tx-0' (00000000c63294ad): kobject_add_internal: parent: 'queues', set: 'queues' [ 586.659957] kobject: 'tx-0' (00000000c63294ad): kobject_uevent_env [ 586.666353] kobject: 'tx-0' (00000000c63294ad): fill_kobj_path: path = '/devices/virtual/net/lo/queues/tx-0' [ 586.677102] kobject: 'tunl0' (000000002e4d6810): kobject_add_internal: parent: 'net', set: 'devices' [ 586.687004] kobject: 'tunl0' (000000002e4d6810): kobject_uevent_env [ 586.693659] kobject: 'tunl0' (000000002e4d6810): fill_kobj_path: path = '/devices/virtual/net/tunl0' [ 586.703086] kobject: 'queues' (00000000bc0a5f65): kobject_add_internal: parent: 'tunl0', set: '' [ 586.712600] kobject: 'queues' (00000000bc0a5f65): kobject_uevent_env [ 586.719141] kobject: 'queues' (00000000bc0a5f65): kobject_uevent_env: filter function caused the event to drop! [ 586.729436] kobject: 'rx-0' (00000000856b5d3a): kobject_add_internal: parent: 'queues', set: 'queues' [ 586.739002] kobject: 'rx-0' (00000000856b5d3a): kobject_uevent_env [ 586.745409] kobject: 'rx-0' (00000000856b5d3a): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/rx-0' [ 586.755848] kobject: 'tx-0' (00000000a77967e7): kobject_add_internal: parent: 'queues', set: 'queues' [ 586.765643] kobject: 'tx-0' (00000000a77967e7): kobject_uevent_env [ 586.772011] kobject: 'tx-0' (00000000a77967e7): fill_kobj_path: path = '/devices/virtual/net/tunl0/queues/tx-0' [ 586.782949] kobject: 'ip_vti0' (00000000b6d3bd36): kobject_cleanup, parent (null) [ 586.783151] kobject: 'gre0' (0000000089336c02): kobject_add_internal: parent: 'net', set: 'devices' [ 586.794096] kobject: 'ip_vti0' (00000000b6d3bd36): auto cleanup 'remove' event [ 586.801796] kobject: 'gre0' (0000000089336c02): kobject_uevent_env [ 586.811330] kobject: 'ip_vti0' (00000000b6d3bd36): kobject_uevent_env [ 586.815049] kobject: 'gre0' (0000000089336c02): fill_kobj_path: path = '/devices/virtual/net/gre0' [ 586.821692] kobject: 'ip_vti0' (00000000b6d3bd36): kobject_uevent_env: uevent_suppress caused the event to drop! [ 586.830865] kobject: 'queues' (000000002a0452bd): kobject_add_internal: parent: 'gre0', set: '' [ 586.843955] kobject: 'ip_vti0' (00000000b6d3bd36): calling ktype release [ 586.850679] kobject: 'queues' (000000002a0452bd): kobject_uevent_env [ 586.859923] kobject: 'ip_vti0': free name [ 586.864033] kobject: 'queues' (000000002a0452bd): kobject_uevent_env: filter function caused the event to drop! [ 586.878466] kobject: 'rx-0' (000000008d55c942): kobject_add_internal: parent: 'queues', set: 'queues' [ 586.887979] kobject: 'rx-0' (000000008d55c942): kobject_uevent_env [ 586.894402] kobject: 'rx-0' (000000008d55c942): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/rx-0' [ 586.904783] kobject: 'tx-0' (0000000003e17ae7): kobject_add_internal: parent: 'queues', set: 'queues' [ 586.914252] kobject: 'tx-0' (0000000003e17ae7): kobject_uevent_env [ 586.920794] kobject: 'tx-0' (0000000003e17ae7): fill_kobj_path: path = '/devices/virtual/net/gre0/queues/tx-0' [ 586.931646] kobject: 'gretap0' (0000000008a3dbb5): kobject_add_internal: parent: 'net', set: 'devices' [ 586.941988] kobject: 'gretap0' (0000000008a3dbb5): kobject_uevent_env [ 586.948677] kobject: 'gretap0' (0000000008a3dbb5): fill_kobj_path: path = '/devices/virtual/net/gretap0' [ 586.958684] kobject: 'queues' (000000009bc2b5bb): kobject_add_internal: parent: 'gretap0', set: '' [ 586.968485] kobject: 'queues' (000000009bc2b5bb): kobject_uevent_env [ 586.975099] kobject: 'queues' (000000009bc2b5bb): kobject_uevent_env: filter function caused the event to drop! [ 586.985554] kobject: 'rx-0' (000000002f74f002): kobject_add_internal: parent: 'queues', set: 'queues' [ 586.994999] kobject: 'rx-0' (000000002f74f002): kobject_uevent_env [ 587.001364] kobject: 'rx-0' (000000002f74f002): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/rx-0' [ 587.011890] kobject: 'tx-0' (000000005c499e8c): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.021501] kobject: 'tx-0' (000000005c499e8c): kobject_uevent_env [ 587.028095] kobject: 'tx-0' (000000005c499e8c): fill_kobj_path: path = '/devices/virtual/net/gretap0/queues/tx-0' [ 587.039246] kobject: 'batman_adv' (00000000fc7b4476): kobject_add_internal: parent: 'gretap0', set: '' [ 587.074188] kobject: 'batman_adv' (00000000af05f1be): kobject_uevent_env [ 587.081075] kobject: 'batman_adv' (00000000af05f1be): kobject_uevent_env: filter function caused the event to drop! [ 587.092013] kobject: 'batman_adv' (00000000af05f1be): kobject_cleanup, parent (null) [ 587.100912] kobject: 'batman_adv' (00000000af05f1be): calling ktype release [ 587.108464] kobject: (00000000af05f1be): dynamic_kobj_release [ 587.114373] kobject: 'batman_adv': free name [ 587.118879] kobject: 'rx-0' (0000000067e02733): kobject_cleanup, parent 000000004b2c25a3 [ 587.127149] kobject: 'rx-0' (0000000067e02733): auto cleanup 'remove' event [ 587.134429] kobject: 'rx-0' (0000000067e02733): kobject_uevent_env [ 587.140756] kobject: 'rx-0' (0000000067e02733): kobject_uevent_env: uevent_suppress caused the event to drop! [ 587.150847] kobject: 'rx-0' (0000000067e02733): auto cleanup kobject_del [ 587.157904] kobject: 'rx-0' (0000000067e02733): calling ktype release [ 587.164520] kobject: 'rx-0': free name [ 587.168450] kobject: 'tx-0' (000000000c38457e): kobject_cleanup, parent 000000004b2c25a3 [ 587.176778] kobject: 'tx-0' (000000000c38457e): auto cleanup 'remove' event [ 587.183919] kobject: 'tx-0' (000000000c38457e): kobject_uevent_env [ 587.190296] kobject: 'tx-0' (000000000c38457e): kobject_uevent_env: uevent_suppress caused the event to drop! [ 587.200387] kobject: 'tx-0' (000000000c38457e): auto cleanup kobject_del [ 587.207435] kobject: 'tx-0' (000000000c38457e): calling ktype release [ 587.214050] kobject: 'tx-0': free name [ 587.218036] kobject: 'queues' (000000004b2c25a3): kobject_cleanup, parent (null) [ 587.226503] kobject: 'queues' (000000004b2c25a3): calling ktype release [ 587.233264] kobject: 'queues' (000000004b2c25a3): kset_release [ 587.239295] kobject: 'queues': free name [ 587.243565] kobject: 'erspan0' (00000000fd20a909): kobject_uevent_env [ 587.250208] kobject: 'erspan0' (00000000fd20a909): kobject_uevent_env: uevent_suppress caused the event to drop! [ 587.261115] kobject: 'erspan0' (0000000076be7434): kobject_add_internal: parent: 'net', set: 'devices' [ 587.271493] kobject: 'erspan0' (0000000076be7434): kobject_uevent_env [ 587.278274] kobject: 'erspan0' (0000000076be7434): fill_kobj_path: path = '/devices/virtual/net/erspan0' [ 587.288283] kobject: 'queues' (00000000a65dfbe3): kobject_add_internal: parent: 'erspan0', set: '' [ 587.297996] kobject: 'queues' (00000000a65dfbe3): kobject_uevent_env [ 587.304693] kobject: 'queues' (00000000a65dfbe3): kobject_uevent_env: filter function caused the event to drop! [ 587.315078] kobject: 'rx-0' (0000000083fe0e41): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.324797] kobject: 'rx-0' (0000000083fe0e41): kobject_uevent_env [ 587.331497] kobject: 'rx-0' (0000000083fe0e41): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/rx-0' [ 587.342033] kobject: 'tx-0' (00000000630aea7a): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.351792] kobject: 'tx-0' (00000000630aea7a): kobject_uevent_env [ 587.358467] kobject: 'tx-0' (00000000630aea7a): fill_kobj_path: path = '/devices/virtual/net/erspan0/queues/tx-0' [ 587.369526] kobject: 'batman_adv' (00000000243612f1): kobject_add_internal: parent: 'erspan0', set: '' [ 587.380055] kobject: 'ip_vti0' (0000000054be78b8): kobject_add_internal: parent: 'net', set: 'devices' [ 587.390244] kobject: 'ip_vti0' (0000000054be78b8): kobject_uevent_env [ 587.396906] kobject: 'ip_vti0' (0000000054be78b8): fill_kobj_path: path = '/devices/virtual/net/ip_vti0' [ 587.406668] kobject: 'queues' (0000000054681d6c): kobject_add_internal: parent: 'ip_vti0', set: '' [ 587.416365] kobject: 'queues' (0000000054681d6c): kobject_uevent_env [ 587.422877] kobject: 'queues' (0000000054681d6c): kobject_uevent_env: filter function caused the event to drop! [ 587.433235] kobject: 'rx-0' (0000000068743b27): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.442807] kobject: 'rx-0' (0000000068743b27): kobject_uevent_env [ 587.449305] kobject: 'rx-0' (0000000068743b27): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/rx-0' [ 587.459889] kobject: 'tx-0' (0000000051894804): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.469444] kobject: 'tx-0' (0000000051894804): kobject_uevent_env [ 587.475988] kobject: 'tx-0' (0000000051894804): fill_kobj_path: path = '/devices/virtual/net/ip_vti0/queues/tx-0' [ 587.487099] kobject: 'erspan0' (00000000fd20a909): kobject_cleanup, parent (null) [ 587.487278] kobject: 'ip6_vti0' (00000000e7b1a365): kobject_add_internal: parent: 'net', set: 'devices' [ 587.495948] kobject: 'erspan0' (00000000fd20a909): auto cleanup 'remove' event [ 587.505945] kobject: 'ip6_vti0' (00000000e7b1a365): kobject_uevent_env [ 587.515222] kobject: 'erspan0' (00000000fd20a909): kobject_uevent_env [ 587.519517] kobject: 'ip6_vti0' (00000000e7b1a365): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0' [ 587.527503] kobject: 'erspan0' (00000000fd20a909): kobject_uevent_env: uevent_suppress caused the event to drop! [ 587.536068] kobject: 'queues' (00000000bc038db9): kobject_add_internal: parent: 'ip6_vti0', set: '' [ 587.549066] kobject: 'erspan0' (00000000fd20a909): calling ktype release [ 587.556535] kobject: 'queues' (00000000bc038db9): kobject_uevent_env [ 587.563492] kobject: 'erspan0': free name [ 587.569938] kobject: 'queues' (00000000bc038db9): kobject_uevent_env: filter function caused the event to drop! [ 587.569972] kobject: 'rx-0' (00000000dfd92a5a): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.596683] kobject: 'rx-0' (00000000dfd92a5a): kobject_uevent_env [ 587.603249] kobject: 'rx-0' (00000000dfd92a5a): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/rx-0' [ 587.614424] kobject: 'tx-0' (0000000024cbef0e): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.623981] kobject: 'tx-0' (0000000024cbef0e): kobject_uevent_env [ 587.630381] kobject: 'tx-0' (0000000024cbef0e): fill_kobj_path: path = '/devices/virtual/net/ip6_vti0/queues/tx-0' [ 587.641661] kobject: 'sit0' (0000000091b37010): kobject_add_internal: parent: 'net', set: 'devices' [ 587.651512] kobject: 'sit0' (0000000091b37010): kobject_uevent_env [ 587.658037] kobject: 'sit0' (0000000091b37010): fill_kobj_path: path = '/devices/virtual/net/sit0' [ 587.667282] kobject: 'queues' (00000000e612c51d): kobject_add_internal: parent: 'sit0', set: '' [ 587.676772] kobject: 'queues' (00000000e612c51d): kobject_uevent_env [ 587.683290] kobject: 'queues' (00000000e612c51d): kobject_uevent_env: filter function caused the event to drop! [ 587.693613] kobject: 'rx-0' (0000000055988b39): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.703148] kobject: 'rx-0' (0000000055988b39): kobject_uevent_env [ 587.709555] kobject: 'rx-0' (0000000055988b39): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/rx-0' [ 587.719868] kobject: 'tx-0' (00000000efbfd1b3): kobject_add_internal: parent: 'queues', set: 'queues' [ 587.729394] kobject: 'tx-0' (00000000efbfd1b3): kobject_uevent_env [ 587.735825] kobject: 'tx-0' (00000000efbfd1b3): fill_kobj_path: path = '/devices/virtual/net/sit0/queues/tx-0' [ 587.770197] kobject: 'batman_adv' (000000009ee3c26d): kobject_uevent_env [ 587.777322] kobject: 'batman_adv' (000000009ee3c26d): kobject_uevent_env: filter function caused the event to drop! [ 587.788101] kobject: 'batman_adv' (000000009ee3c26d): kobject_cleanup, parent (null) [ 587.796984] kobject: 'batman_adv' (000000009ee3c26d): calling ktype release [ 587.804313] kobject: (000000009ee3c26d): dynamic_kobj_release [ 587.810266] kobject: 'batman_adv': free name [ 587.814882] kobject: 'rx-0' (00000000cdf2ca2f): kobject_cleanup, parent 000000002b7716cd [ 587.823218] kobject: 'rx-0' (00000000cdf2ca2f): auto cleanup 'remove' event [ 587.830520] kobject: 'rx-0' (00000000cdf2ca2f): kobject_uevent_env [ 587.836939] kobject: 'rx-0' (00000000cdf2ca2f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 587.847672] kobject: 'rx-0' (00000000cdf2ca2f): auto cleanup kobject_del [ 587.854588] kobject: 'rx-0' (00000000cdf2ca2f): calling ktype release [ 587.861175] kobject: 'rx-0': free name [ 587.865149] kobject: 'tx-0' (00000000e054808f): kobject_cleanup, parent 000000002b7716cd [ 587.873393] kobject: 'tx-0' (00000000e054808f): auto cleanup 'remove' event [ 587.880549] kobject: 'tx-0' (00000000e054808f): kobject_uevent_env [ 587.886901] kobject: 'tx-0' (00000000e054808f): kobject_uevent_env: uevent_suppress caused the event to drop! [ 587.897143] kobject: 'tx-0' (00000000e054808f): auto cleanup kobject_del [ 587.904098] kobject: 'tx-0' (00000000e054808f): calling ktype release [ 587.910866] kobject: 'tx-0': free name [ 587.914878] kobject: 'queues' (000000002b7716cd): kobject_cleanup, parent (null) [ 587.923289] kobject: 'queues' (000000002b7716cd): calling ktype release [ 587.930089] kobject: 'queues' (000000002b7716cd): kset_release [ 587.936110] kobject: 'queues': free name [ 587.940384] kobject: 'gretap0' (0000000002e3aded): kobject_uevent_env [ 587.947118] kobject: 'gretap0' (0000000002e3aded): kobject_uevent_env: uevent_suppress caused the event to drop! [ 587.957945] kobject: 'ip6tnl0' (00000000eed9a15b): kobject_add_internal: parent: 'net', set: 'devices' [ 587.968118] kobject: 'ip6tnl0' (00000000eed9a15b): kobject_uevent_env [ 587.974810] kobject: 'ip6tnl0' (00000000eed9a15b): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0' [ 587.984612] kobject: 'queues' (00000000292c64db): kobject_add_internal: parent: 'ip6tnl0', set: '' [ 587.994358] kobject: 'queues' (00000000292c64db): kobject_uevent_env [ 588.000938] kobject: 'queues' (00000000292c64db): kobject_uevent_env: filter function caused the event to drop! [ 588.011277] kobject: 'rx-0' (000000002e7e061b): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.020760] kobject: 'rx-0' (000000002e7e061b): kobject_uevent_env [ 588.027340] kobject: 'rx-0' (000000002e7e061b): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/rx-0' [ 588.038055] kobject: 'tx-0' (0000000021b0b7bd): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.047628] kobject: 'tx-0' (0000000021b0b7bd): kobject_uevent_env [ 588.054094] kobject: 'tx-0' (0000000021b0b7bd): fill_kobj_path: path = '/devices/virtual/net/ip6tnl0/queues/tx-0' [ 588.065331] kobject: 'gretap0' (0000000002e3aded): kobject_cleanup, parent (null) [ 588.065469] kobject: 'ip6gre0' (000000002c2116ec): kobject_add_internal: parent: 'net', set: 'devices' [ 588.075486] kobject: 'gretap0' (0000000002e3aded): auto cleanup 'remove' event [ 588.084082] kobject: 'ip6gre0' (000000002c2116ec): kobject_uevent_env [ 588.094845] kobject: 'gretap0' (0000000002e3aded): kobject_uevent_env [ 588.097418] kobject: 'ip6gre0' (000000002c2116ec): fill_kobj_path: path = '/devices/virtual/net/ip6gre0' [ 588.106764] kobject: 'gretap0' (0000000002e3aded): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.114016] kobject: 'queues' (0000000037dc1993): kobject_add_internal: parent: 'ip6gre0', set: '' [ 588.124631] kobject: 'gretap0' (0000000002e3aded): calling ktype release [ 588.134071] kobject: 'queues' (0000000037dc1993): kobject_uevent_env [ 588.134086] kobject: 'queues' (0000000037dc1993): kobject_uevent_env: filter function caused the event to drop! [ 588.143748] kobject: 'gretap0': free name [ 588.147658] kobject: 'rx-0' (00000000825f4908): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.171570] kobject: 'rx-0' (00000000825f4908): kobject_uevent_env [ 588.177991] kobject: 'rx-0' (00000000825f4908): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/rx-0' [ 588.188826] kobject: 'tx-0' (0000000093a6a15d): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.198916] kobject: 'tx-0' (0000000093a6a15d): kobject_uevent_env [ 588.205432] kobject: 'tx-0' (0000000093a6a15d): fill_kobj_path: path = '/devices/virtual/net/ip6gre0/queues/tx-0' [ 588.241572] kobject: 'rx-0' (00000000675909e4): kobject_cleanup, parent 000000001f4d2403 [ 588.250252] kobject: 'rx-0' (00000000675909e4): auto cleanup 'remove' event [ 588.257595] kobject: 'rx-0' (00000000675909e4): kobject_uevent_env [ 588.264305] kobject: 'rx-0' (00000000675909e4): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.274558] kobject: 'rx-0' (00000000675909e4): auto cleanup kobject_del [ 588.281535] kobject: 'rx-0' (00000000675909e4): calling ktype release [ 588.288460] kobject: 'rx-0': free name [ 588.292569] kobject: 'tx-0' (00000000ed754039): kobject_cleanup, parent 000000001f4d2403 [ 588.300985] kobject: 'tx-0' (00000000ed754039): auto cleanup 'remove' event [ 588.308227] kobject: 'tx-0' (00000000ed754039): kobject_uevent_env [ 588.314750] kobject: 'tx-0' (00000000ed754039): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.325057] kobject: 'tx-0' (00000000ed754039): auto cleanup kobject_del [ 588.332009] kobject: 'tx-0' (00000000ed754039): calling ktype release [ 588.338651] kobject: 'tx-0': free name [ 588.342746] kobject: 'queues' (000000001f4d2403): kobject_cleanup, parent (null) [ 588.351503] kobject: 'queues' (000000001f4d2403): calling ktype release [ 588.358458] kobject: 'queues' (000000001f4d2403): kset_release [ 588.364493] kobject: 'queues': free name [ 588.368788] kobject: 'gre0' (000000001b0d6152): kobject_uevent_env [ 588.375275] kobject: 'gre0' (000000001b0d6152): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.385770] kobject: 'syz_tun' (000000000d93b12d): kobject_add_internal: parent: 'net', set: 'devices' [ 588.395951] kobject: 'syz_tun' (000000000d93b12d): kobject_uevent_env [ 588.402568] kobject: 'syz_tun' (000000000d93b12d): fill_kobj_path: path = '/devices/virtual/net/syz_tun' [ 588.415215] kobject: 'queues' (0000000038d0a232): kobject_add_internal: parent: 'syz_tun', set: '' [ 588.424961] kobject: 'queues' (0000000038d0a232): kobject_uevent_env [ 588.431478] kobject: 'queues' (0000000038d0a232): kobject_uevent_env: filter function caused the event to drop! [ 588.441929] kobject: 'rx-0' (00000000273843ee): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.451531] kobject: 'rx-0' (00000000273843ee): kobject_uevent_env [ 588.457997] kobject: 'rx-0' (00000000273843ee): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/rx-0' [ 588.468489] kobject: 'tx-0' (000000000aab0d28): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.478176] kobject: 'tx-0' (000000000aab0d28): kobject_uevent_env [ 588.484832] kobject: 'tx-0' (000000000aab0d28): fill_kobj_path: path = '/devices/virtual/net/syz_tun/queues/tx-0' [ 588.496052] kobject: 'batman_adv' (0000000006fa587b): kobject_add_internal: parent: 'syz_tun', set: '' [ 588.506420] kobject: 'gre0' (000000001b0d6152): kobject_cleanup, parent (null) [ 588.510344] kobject: 'ip6gretap0' (000000007593c9a0): kobject_add_internal: parent: 'net', set: 'devices' [ 588.517675] kobject: 'gre0' (000000001b0d6152): auto cleanup 'remove' event [ 588.525525] kobject: 'ip6gretap0' (000000007593c9a0): kobject_uevent_env [ 588.532380] kobject: 'gre0' (000000001b0d6152): kobject_uevent_env [ 588.539097] kobject: 'ip6gretap0' (000000007593c9a0): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0' [ 588.548498] kobject: 'gre0' (000000001b0d6152): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.555911] kobject: 'queues' (00000000b968662e): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 588.570324] kobject: 'gre0' (000000001b0d6152): calling ktype release [ 588.576310] kobject: 'queues' (00000000b968662e): kobject_uevent_env [ 588.582984] kobject: 'gre0': free name [ 588.589403] kobject: 'queues' (00000000b968662e): kobject_uevent_env: filter function caused the event to drop! [ 588.589434] kobject: 'rx-0' (0000000064259446): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.589490] kobject: 'rx-0' (0000000064259446): kobject_uevent_env [ 588.619458] kobject: 'rx-0' (0000000064259446): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/rx-0' [ 588.630341] kobject: 'tx-0' (000000003cbec8a7): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.639899] kobject: 'tx-0' (000000003cbec8a7): kobject_uevent_env [ 588.646577] kobject: 'tx-0' (000000003cbec8a7): fill_kobj_path: path = '/devices/virtual/net/ip6gretap0/queues/tx-0' [ 588.657876] kobject: 'batman_adv' (000000006f968db1): kobject_add_internal: parent: 'ip6gretap0', set: '' [ 588.690918] kobject: 'rx-0' (000000009fd6b06b): kobject_cleanup, parent 0000000045f109f4 [ 588.699519] kobject: 'rx-0' (000000009fd6b06b): auto cleanup 'remove' event [ 588.706960] kobject: 'rx-0' (000000009fd6b06b): kobject_uevent_env [ 588.713302] kobject: 'rx-0' (000000009fd6b06b): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.723521] kobject: 'rx-0' (000000009fd6b06b): auto cleanup kobject_del [ 588.730826] kobject: 'rx-0' (000000009fd6b06b): calling ktype release [ 588.737461] kobject: 'rx-0': free name [ 588.741399] kobject: 'tx-0' (000000008f5448eb): kobject_cleanup, parent 0000000045f109f4 [ 588.749801] kobject: 'tx-0' (000000008f5448eb): auto cleanup 'remove' event [ 588.756935] kobject: 'tx-0' (000000008f5448eb): kobject_uevent_env [ 588.763253] kobject: 'tx-0' (000000008f5448eb): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.773400] kobject: 'tx-0' (000000008f5448eb): auto cleanup kobject_del [ 588.780334] kobject: 'tx-0' (000000008f5448eb): calling ktype release [ 588.787244] kobject: 'tx-0': free name [ 588.791154] kobject: 'queues' (0000000045f109f4): kobject_cleanup, parent (null) [ 588.799902] kobject: 'queues' (0000000045f109f4): calling ktype release [ 588.806804] kobject: 'queues' (0000000045f109f4): kset_release [ 588.812783] kobject: 'queues': free name [ 588.817252] kobject: 'tunl0' (000000002d874359): kobject_uevent_env [ 588.823662] kobject: 'tunl0' (000000002d874359): kobject_uevent_env: uevent_suppress caused the event to drop! [ 588.834583] kobject: 'bridge0' (00000000f617e1ab): kobject_add_internal: parent: 'net', set: 'devices' [ 588.844961] kobject: 'bridge0' (00000000f617e1ab): kobject_uevent_env [ 588.851640] kobject: 'bridge0' (00000000f617e1ab): fill_kobj_path: path = '/devices/virtual/net/bridge0' [ 588.861603] kobject: 'queues' (000000000c37bf59): kobject_add_internal: parent: 'bridge0', set: '' [ 588.871279] kobject: 'queues' (000000000c37bf59): kobject_uevent_env [ 588.878059] kobject: 'queues' (000000000c37bf59): kobject_uevent_env: filter function caused the event to drop! [ 588.889380] kobject: 'rx-0' (00000000720b7f45): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.898998] kobject: 'rx-0' (00000000720b7f45): kobject_uevent_env [ 588.905393] kobject: 'rx-0' (00000000720b7f45): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/rx-0' [ 588.915963] kobject: 'tx-0' (000000000efa8d68): kobject_add_internal: parent: 'queues', set: 'queues' [ 588.925492] kobject: 'tx-0' (000000000efa8d68): kobject_uevent_env [ 588.931927] kobject: 'tx-0' (000000000efa8d68): fill_kobj_path: path = '/devices/virtual/net/bridge0/queues/tx-0' [ 588.943215] kobject: 'brif' (000000004080d51d): kobject_add_internal: parent: 'bridge0', set: '' [ 588.952851] kobject: 'batman_adv' (000000005dac6318): kobject_add_internal: parent: 'bridge0', set: '' [ 588.963456] kobject: 'vcan0' (000000003fa177b9): kobject_add_internal: parent: 'net', set: 'devices' [ 588.973092] kobject: 'vcan0' (000000003fa177b9): kobject_uevent_env [ 588.979569] kobject: 'vcan0' (000000003fa177b9): fill_kobj_path: path = '/devices/virtual/net/vcan0' [ 588.988969] kobject: 'queues' (0000000080b805d1): kobject_add_internal: parent: 'vcan0', set: '' [ 588.998495] kobject: 'queues' (0000000080b805d1): kobject_uevent_env [ 589.005063] kobject: 'queues' (0000000080b805d1): kobject_uevent_env: filter function caused the event to drop! [ 589.015374] kobject: 'rx-0' (00000000b45496ea): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.024912] kobject: 'rx-0' (00000000b45496ea): kobject_uevent_env [ 589.031266] kobject: 'rx-0' (00000000b45496ea): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/rx-0' [ 589.041783] kobject: 'tx-0' (00000000ce50032f): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.051260] kobject: 'tx-0' (00000000ce50032f): kobject_uevent_env [ 589.057651] kobject: 'tx-0' (00000000ce50032f): fill_kobj_path: path = '/devices/virtual/net/vcan0/queues/tx-0' [ 589.068277] kobject: 'tunl0' (000000002d874359): kobject_cleanup, parent (null) [ 589.076654] kobject: 'tunl0' (000000002d874359): auto cleanup 'remove' event [ 589.078917] kobject: 'bond0' (000000000c56b2f1): kobject_add_internal: parent: 'net', set: 'devices' [ 589.084135] kobject: 'tunl0' (000000002d874359): kobject_uevent_env [ 589.096643] kobject: 'bond0' (000000000c56b2f1): kobject_uevent_env [ 589.100209] kobject: 'tunl0' (000000002d874359): kobject_uevent_env: uevent_suppress caused the event to drop! [ 589.108677] kobject: 'bond0' (000000000c56b2f1): fill_kobj_path: path = '/devices/virtual/net/bond0' [ 589.116801] kobject: 'tunl0' (000000002d874359): calling ktype release [ 589.130819] kobject: 'queues' (00000000b684febf): kobject_add_internal: parent: 'bond0', set: '' [ 589.132905] kobject: 'tunl0': free name [ 589.142410] kobject: 'queues' (00000000b684febf): kobject_uevent_env [ 589.152964] kobject: 'queues' (00000000b684febf): kobject_uevent_env: filter function caused the event to drop! [ 589.163493] kobject: 'rx-0' (00000000e2d64d84): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.173250] kobject: 'rx-0' (00000000e2d64d84): kobject_uevent_env [ 589.179959] kobject: 'rx-0' (00000000e2d64d84): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-0' [ 589.190401] kobject: 'rx-1' (00000000f1860869): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.199958] kobject: 'rx-1' (00000000f1860869): kobject_uevent_env [ 589.206652] kobject: 'rx-1' (00000000f1860869): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-1' [ 589.216985] kobject: 'rx-2' (000000004a9248c9): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.226444] kobject: 'rx-2' (000000004a9248c9): kobject_uevent_env [ 589.232849] kobject: 'rx-2' (000000004a9248c9): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-2' [ 589.243348] kobject: 'rx-3' (0000000084dac745): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.252907] kobject: 'rx-3' (0000000084dac745): kobject_uevent_env [ 589.259369] kobject: 'rx-3' (0000000084dac745): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-3' [ 589.269680] kobject: 'rx-4' (000000000c0380f5): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.279144] kobject: 'rx-4' (000000000c0380f5): kobject_uevent_env [ 589.285522] kobject: 'rx-4' (000000000c0380f5): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-4' [ 589.295883] kobject: 'rx-5' (0000000044b4bc41): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.305562] kobject: 'rx-5' (0000000044b4bc41): kobject_uevent_env [ 589.312110] kobject: 'rx-5' (0000000044b4bc41): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-5' [ 589.322553] kobject: 'rx-6' (000000008e692da6): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.332072] kobject: 'rx-6' (000000008e692da6): kobject_uevent_env [ 589.338517] kobject: 'rx-6' (000000008e692da6): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-6' [ 589.349181] kobject: 'rx-7' (00000000b1b539c2): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.358632] kobject: 'rx-7' (00000000b1b539c2): kobject_uevent_env [ 589.365210] kobject: 'rx-7' (00000000b1b539c2): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-7' [ 589.375563] kobject: 'rx-8' (0000000057d23130): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.385112] kobject: 'rx-8' (0000000057d23130): kobject_uevent_env [ 589.391496] kobject: 'rx-8' (0000000057d23130): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-8' [ 589.402147] kobject: 'rx-9' (00000000ab9a3040): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.411661] kobject: 'rx-9' (00000000ab9a3040): kobject_uevent_env [ 589.418183] kobject: 'rx-9' (00000000ab9a3040): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-9' [ 589.428495] kobject: 'rx-10' (000000007a6851c0): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.438311] kobject: 'rx-10' (000000007a6851c0): kobject_uevent_env [ 589.444867] kobject: 'rx-10' (000000007a6851c0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-10' [ 589.455433] kobject: 'rx-11' (000000007d7d5fcc): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.464984] kobject: 'rx-11' (000000007d7d5fcc): kobject_uevent_env [ 589.471432] kobject: 'rx-11' (000000007d7d5fcc): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-11' [ 589.481977] kobject: 'rx-12' (00000000f66ff290): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.491592] kobject: 'rx-12' (00000000f66ff290): kobject_uevent_env [ 589.498102] kobject: 'rx-12' (00000000f66ff290): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-12' [ 589.508588] kobject: 'rx-13' (000000008c677562): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.518126] kobject: 'rx-13' (000000008c677562): kobject_uevent_env [ 589.524607] kobject: 'rx-13' (000000008c677562): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-13' [ 589.535147] kobject: 'rx-14' (00000000baa8d899): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.544836] kobject: 'rx-14' (00000000baa8d899): kobject_uevent_env [ 589.551312] kobject: 'rx-14' (00000000baa8d899): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-14' [ 589.561860] kobject: 'rx-15' (000000001aaafb7f): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.571533] kobject: 'rx-15' (000000001aaafb7f): kobject_uevent_env [ 589.578018] kobject: 'rx-15' (000000001aaafb7f): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/rx-15' [ 589.588501] kobject: 'tx-0' (00000000fdfe479a): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.598009] kobject: 'tx-0' (00000000fdfe479a): kobject_uevent_env [ 589.604403] kobject: 'tx-0' (00000000fdfe479a): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-0' [ 589.614785] kobject: 'tx-1' (00000000ca451b18): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.624308] kobject: 'tx-1' (00000000ca451b18): kobject_uevent_env [ 589.630650] kobject: 'tx-1' (00000000ca451b18): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-1' [ 589.641359] kobject: 'tx-2' (00000000ee18b0fa): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.650841] kobject: 'tx-2' (00000000ee18b0fa): kobject_uevent_env [ 589.657336] kobject: 'tx-2' (00000000ee18b0fa): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-2' [ 589.667780] kobject: 'tx-3' (000000004716df80): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.677437] kobject: 'tx-3' (000000004716df80): kobject_uevent_env [ 589.683838] kobject: 'tx-3' (000000004716df80): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-3' [ 589.694541] kobject: 'tx-4' (00000000eb82ab97): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.704063] kobject: 'tx-4' (00000000eb82ab97): kobject_uevent_env [ 589.710407] kobject: 'tx-4' (00000000eb82ab97): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-4' [ 589.720795] kobject: 'tx-5' (00000000872bf165): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.730264] kobject: 'tx-5' (00000000872bf165): kobject_uevent_env [ 589.736653] kobject: 'tx-5' (00000000872bf165): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-5' [ 589.746965] kobject: 'tx-6' (0000000061371879): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.756479] kobject: 'tx-6' (0000000061371879): kobject_uevent_env [ 589.762824] kobject: 'tx-6' (0000000061371879): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-6' [ 589.773151] kobject: 'tx-7' (00000000bfa5ed85): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.782761] kobject: 'tx-7' (00000000bfa5ed85): kobject_uevent_env [ 589.789145] kobject: 'tx-7' (00000000bfa5ed85): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-7' [ 589.799449] kobject: 'tx-8' (0000000032d58010): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.808967] kobject: 'tx-8' (0000000032d58010): kobject_uevent_env [ 589.815390] kobject: 'tx-8' (0000000032d58010): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-8' [ 589.826050] kobject: 'tx-9' (00000000ec05bab0): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.835580] kobject: 'tx-9' (00000000ec05bab0): kobject_uevent_env [ 589.842132] kobject: 'tx-9' (00000000ec05bab0): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-9' [ 589.852466] kobject: 'tx-10' (00000000c433d3b7): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.862014] kobject: 'tx-10' (00000000c433d3b7): kobject_uevent_env [ 589.868483] kobject: 'tx-10' (00000000c433d3b7): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-10' [ 589.878967] kobject: 'tx-11' (00000000e92eb065): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.889001] kobject: 'tx-11' (00000000e92eb065): kobject_uevent_env [ 589.895461] kobject: 'tx-11' (00000000e92eb065): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-11' [ 589.905973] kobject: 'tx-12' (0000000065353f68): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.915543] kobject: 'tx-12' (0000000065353f68): kobject_uevent_env [ 589.922028] kobject: 'tx-12' (0000000065353f68): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-12' [ 589.932564] kobject: 'tx-13' (00000000f0e718b8): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.942229] kobject: 'tx-13' (00000000f0e718b8): kobject_uevent_env [ 589.948759] kobject: 'tx-13' (00000000f0e718b8): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-13' [ 589.959505] kobject: 'tx-14' (000000000b7ad587): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.969257] kobject: 'tx-14' (000000000b7ad587): kobject_uevent_env [ 589.975756] kobject: 'tx-14' (000000000b7ad587): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-14' [ 589.986444] kobject: 'tx-15' (0000000046ac61ab): kobject_add_internal: parent: 'queues', set: 'queues' [ 589.996005] kobject: 'tx-15' (0000000046ac61ab): kobject_uevent_env [ 590.002431] kobject: 'tx-15' (0000000046ac61ab): fill_kobj_path: path = '/devices/virtual/net/bond0/queues/tx-15' [ 590.013477] kobject: 'batman_adv' (000000004ecbc692): kobject_add_internal: parent: 'bond0', set: '' [ 590.023889] kobject: 'mesh' (00000000f6f472a8): kobject_uevent_env [ 590.030237] kobject: 'mesh' (00000000f6f472a8): kobject_uevent_env: filter function caused the event to drop! [ 590.040618] device bridge_slave_1 left promiscuous mode [ 590.046140] bridge0: port 2(bridge_slave_1) entered disabled state [ 590.104260] kobject: 'brport' (00000000116b0bc1): kobject_uevent_env [ 590.110790] kobject: 'brport' (00000000116b0bc1): kobject_uevent_env: filter function caused the event to drop! [ 590.121192] device bridge_slave_0 left promiscuous mode [ 590.126742] bridge0: port 1(bridge_slave_0) entered disabled state [ 590.153924] kobject: 'brport' (00000000116b0bc1): kobject_cleanup, parent (null) [ 590.162468] kobject: 'brport' (00000000116b0bc1): calling ktype release [ 590.169260] kobject: 'brport': free name [ 590.184494] kobject: 'brport' (00000000fd9f6292): kobject_uevent_env [ 590.191085] kobject: 'brport' (00000000fd9f6292): kobject_uevent_env: filter function caused the event to drop! [ 590.201812] kobject: 'brif' (00000000be09a4e4): kobject_cleanup, parent 000000003ce6aad8 [ 590.210231] kobject: 'brif' (00000000be09a4e4): auto cleanup kobject_del [ 590.217461] kobject: 'brif' (00000000be09a4e4): calling ktype release [ 590.224086] kobject: (00000000be09a4e4): dynamic_kobj_release [ 590.229976] kobject: 'brif': free name [ 590.253831] kobject: 'brport' (00000000fd9f6292): kobject_cleanup, parent (null) [ 590.262265] kobject: 'brport' (00000000fd9f6292): calling ktype release [ 590.269147] kobject: 'brport': free name [ 590.736813] kobject: 'vlan0' (00000000e56df7a9): kobject_uevent_env [ 590.743408] kobject: 'vlan0' (00000000e56df7a9): kobject_uevent_env: attempted to send uevent without kset! [ 590.753456] kobject: 'mesh' (00000000f6f472a8): kobject_cleanup, parent (null) [ 590.761738] kobject: 'mesh' (00000000f6f472a8): calling ktype release [ 590.768352] kobject: (00000000f6f472a8): dynamic_kobj_release [ 590.774277] kobject: 'mesh': free name [ 590.778177] kobject: 'vlan0' (00000000e56df7a9): kobject_cleanup, parent (null) [ 590.786518] kobject: 'vlan0' (00000000e56df7a9): calling ktype release [ 590.793261] kobject: (00000000e56df7a9): dynamic_kobj_release [ 590.799174] kobject: 'vlan0': free name [ 590.956656] kobject: 'batman_adv' (00000000a52cfc6e): kobject_uevent_env [ 590.963556] kobject: 'batman_adv' (00000000a52cfc6e): kobject_uevent_env: filter function caused the event to drop! [ 590.974591] kobject: 'batman_adv' (00000000a52cfc6e): kobject_cleanup, parent (null) [ 590.983463] kobject: 'batman_adv' (00000000a52cfc6e): calling ktype release [ 590.990620] kobject: (00000000a52cfc6e): dynamic_kobj_release [ 590.996694] kobject: 'batman_adv': free name [ 591.034345] kobject: 'rx-0' (00000000c2afbaad): kobject_cleanup, parent 00000000e10aa741 [ 591.042747] kobject: 'rx-0' (00000000c2afbaad): auto cleanup 'remove' event [ 591.051388] kobject: 'rx-0' (00000000c2afbaad): kobject_uevent_env [ 591.057862] kobject: 'rx-0' (00000000c2afbaad): kobject_uevent_env: uevent_suppress caused the event to drop! [ 591.068258] kobject: 'rx-0' (00000000c2afbaad): auto cleanup kobject_del [ 591.075172] kobject: 'rx-0' (00000000c2afbaad): calling ktype release [ 591.081944] kobject: 'rx-0': free name [ 591.085918] kobject: 'tx-0' (00000000d547eb60): kobject_cleanup, parent 00000000e10aa741 [ 591.094172] kobject: 'tx-0' (00000000d547eb60): auto cleanup 'remove' event [ 591.101268] kobject: 'tx-0' (00000000d547eb60): kobject_uevent_env [ 591.107749] kobject: 'tx-0' (00000000d547eb60): kobject_uevent_env: uevent_suppress caused the event to drop! [ 591.117983] kobject: 'tx-0' (00000000d547eb60): auto cleanup kobject_del [ 591.124903] kobject: 'tx-0' (00000000d547eb60): calling ktype release